INFO: task kworker/1:1:47 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:47 tgid:47 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df921d84 r8:00000002 r7:60000113 r6:df921d8c r5:833a5400 r4:833a5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df921e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85871c80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbef000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fdf8c r4:857fdc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fdf8c r4:832a0000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a5400 r8:832a002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0000 r8:8027f5e8 r7:df879e60 r6:83369e00 r5:833a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf921fb0 to 0xdf921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:832a1000 INFO: task kworker/1:1:47 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:3:2885 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:2885 tgid:2885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec83dd84 r8:00000002 r7:60000113 r6:ec83dd8c r5:8386e000 r4:8386e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8386e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec83de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221fc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8386e000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e238c r4:847e2000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e238c r4:84584180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8386e000 r8:845841ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84584180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84584180 r8:8027f5e8 r7:df83de60 r6:84584100 r5:8386e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec83dfb0 to 0xec83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845818c0 INFO: task kworker/0:3:2885 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/1:0:3091 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3091 tgid:3091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df981d84 r8:00000002 r7:60000113 r6:df981d8c r5:84486000 r4:84486000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84486000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858726c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84486000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe95000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580938c r4:85809000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580938c r4:8475ec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84486000 r8:8475ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475ec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475ec80 r8:8027f5e8 r7:e05ede60 r6:8475e780 r5:84486000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84787840 INFO: task kworker/1:0:3091 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/1:3:3110 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3110 tgid:3110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df9a5d84 r8:00000002 r7:60000113 r6:df9a5d8c r5:84150000 r4:84150000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84150000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85870080 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84150000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec86b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580b78c r4:8580b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580b78c r4:84229c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84150000 r8:84229c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84229c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84229c00 r8:8027f5e8 r7:e05ede60 r6:8456cc00 r5:84150000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a5fb0 to 0xdf9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847183c0 INFO: task kworker/1:3:3110 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/1:9:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df9bdd84 r8:00000002 r7:60000113 r6:df9bdd8c r5:83ad8000 r4:83ad8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9bde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e4000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555938c r4:85559000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555938c r4:8456e780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8000 r8:8456e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8456e780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8456e780 r8:8027f5e8 r7:df9f1e60 r6:8456cd80 r5:83ad8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9bdfb0 to 0xdf9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741400 INFO: task kworker/1:9:3126 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/1:10:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df9add84 r8:00000002 r7:60000113 r6:df9add8c r5:83a81800 r4:83a81800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a81800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5e340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf53000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85422f8c r4:85422c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85422f8c r4:8456e380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a81800 r8:8456e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8456e380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8456e380 r8:8027f5e8 r7:df9bde60 r6:8475e700 r5:83a81800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9adfb0 to 0xdf9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741100 INFO: task kworker/1:10:3127 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:9:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:83ac0000 r4:83ac0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a8d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac0000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e02b3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e1f8c r4:847e1c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e1f8c r4:8478b100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac0000 r8:8478b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b100 r8:8027f5e8 r7:ec83de60 r6:8478b180 r5:83ac0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791080 INFO: task kworker/0:9:3139 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:10:3141 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:83ac1800 r4:83ac1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a8f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0257000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e1b8c r4:847e1800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e1b8c r4:8478b200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac1800 r8:8478b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b200 r8:8027f5e8 r7:ec83de60 r6:8478b280 r5:83ac1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847912c0 INFO: task kworker/0:10:3141 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:11:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:83ac6c00 r4:83ac6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae25000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536db8c r4:8536d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536db8c r4:8478b300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6c00 r8:8478b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b300 r8:8027f5e8 r7:ec83de60 r6:8478b380 r5:83ac6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847912c0 INFO: task kworker/0:11:3143 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:12:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa45d84 r8:00000002 r7:60000013 r6:dfa45d8c r5:83ac4800 r4:83ac4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479e100 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa55000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e278c r4:847e2400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e278c r4:8478b400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac4800 r8:8478b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b400 r8:8027f5e8 r7:dfa75e60 r6:8478b480 r5:83ac4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847912c0 INFO: task kworker/0:12:3144 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83880c00 r4:83880c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83880c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a58e80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83880c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa85000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528a78c r4:8528a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528a78c r4:8478b500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83880c00 r8:8478b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b500 r8:8027f5e8 r7:dfa75e60 r6:8478b580 r5:83880c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791a40 INFO: task kworker/0:13:3148 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3149 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83886000 r4:83886000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83886000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a39c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83886000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac79000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529f78c r4:8529f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529f78c r4:8478b600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83886000 r8:8478b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b600 r8:8027f5e8 r7:dfa75e60 r6:8478b680 r5:83886000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791a40 INFO: task kworker/0:14:3149 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83881800 r4:83881800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83881800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84743b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83881800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb374000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536cf8c r4:8536cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536cf8c r4:8478b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83881800 r8:8478b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b700 r8:8027f5e8 r7:dfa75e60 r6:8478b780 r5:83881800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847918c0 INFO: task kworker/0:15:3151 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3152 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:83883c00 r4:83883c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83883c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8a380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83883c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa61000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540d78c r4:8540d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8540d78c r4:8478b800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83883c00 r8:8478b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b800 r8:8027f5e8 r7:dfa75e60 r6:8478b880 r5:83883c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791a40 INFO: task kworker/0:16:3152 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3154 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:844d0000 r4:844d0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791cc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536fb8c r4:8536f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536fb8c r4:8478b900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d0000 r8:8478b92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b900 r8:8027f5e8 r7:dfaa5e60 r6:8478b980 r5:844d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791bc0 INFO: task kworker/0:17:3154 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3157 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:844d5400 r4:844d5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a858c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd11000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556638c r4:85566000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556638c r4:8478ba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d5400 r8:8478ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478ba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ba00 r8:8027f5e8 r7:dfaa5e60 r6:8478ba80 r5:844d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791dc0 INFO: task kworker/0:18:3157 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfac9d84 r8:00000002 r7:60000013 r6:dfac9d8c r5:844d6000 r4:844d6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e478c r4:847e4400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e478c r4:8478bb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6000 r8:8478bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478bb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bb00 r8:8027f5e8 r7:dfabde60 r6:8478bb80 r5:844d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791f00 INFO: task kworker/0:19:3158 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:844d4800 r4:844d4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ce800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534ab8c r4:8534a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534ab8c r4:8478bc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d4800 r8:8478bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478bc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bc00 r8:8027f5e8 r7:dfabde60 r6:8478bc80 r5:844d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746100 INFO: task kworker/0:20:3160 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3162 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:844d3c00 r4:844d3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bb040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542278c r4:85422400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542278c r4:830b8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d3c00 r8:830b842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027f5e8 r7:df9bde60 r6:8478bd00 r5:844d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741980 INFO: task kworker/1:11:3162 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3165 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfad5d84 r8:00000002 r7:60000013 r6:dfad5d8c r5:84486c00 r4:84486c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84486c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847465c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84486c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85480f8c r4:85480c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85480f8c r4:8478bd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84486c00 r8:8478bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478bd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bd80 r8:8027f5e8 r7:dfabde60 r6:830b8380 r5:84486c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847464c0 INFO: task kworker/0:21:3165 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3167 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83242400 r4:83242400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bb180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85483f8c r4:85483c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85483f8c r4:830b8680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:830b86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8680 r8:8027f5e8 r7:df9bde60 r6:830b8500 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741480 INFO: task kworker/1:12:3167 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3169 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:83ace000 r4:83ace000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ace000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ace000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843bbf8c r4:843bbc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843bbf8c r4:8456cb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ace000 r8:8456cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8456cb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8456cb80 r8:8027f5e8 r7:df9bde60 r6:84199a00 r5:83ace000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741b00 INFO: task kworker/1:13:3169 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3170 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:844d0c00 r4:844d0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508cbc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb855000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554738c r4:85547000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554738c r4:8478be00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d0c00 r8:8478be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478be00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478be00 r8:8027f5e8 r7:dfabde60 r6:8478be80 r5:844d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847467c0 INFO: task kworker/0:22:3170 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3173 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:844d1800 r4:844d1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587ab80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3fd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e678c r4:847e6400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e678c r4:8478bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d1800 r8:8478bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bf00 r8:8027f5e8 r7:dfabde60 r6:8478bf80 r5:844d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746a80 INFO: task kworker/0:23:3173 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3175 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb19d84 r8:00000002 r7:60000013 r6:dfb19d8c r5:833a0c00 r4:833a0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858728c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebec7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85809b8c r4:85809800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85809b8c r4:838a1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a0c00 r8:838a11ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838a1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a1180 r8:8027f5e8 r7:df9bde60 r6:838a1100 r5:833a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741200 INFO: task kworker/1:14:3175 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3177 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:83aeb000 r4:83aeb000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aeb000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aeb000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556738c r4:85567000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556738c r4:8474e000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aeb000 r8:8474e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e000 r8:8027f5e8 r7:dfb39e60 r6:83358300 r5:83aeb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746d80 INFO: task kworker/0:24:3177 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3179 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:8385e000 r4:8385e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8385e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e8ec0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8385e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85567b8c r4:85567800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85567b8c r4:8474e080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8385e000 r8:8474e0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e080 r8:8027f5e8 r7:dfb39e60 r6:83358200 r5:8385e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746a00 INFO: task kworker/0:25:3179 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb41d84 r8:00000002 r7:60000013 r6:dfb41d8c r5:844d6c00 r4:844d6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84746e40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e638c r4:847e6000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e638c r4:8474e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6c00 r8:8474e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e180 r8:8027f5e8 r7:dfb39e60 r6:8474e200 r5:844d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746c40 INFO: task kworker/0:26:3181 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:844d2400 r4:844d2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85871e40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc0f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fe78c r4:857fe400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fe78c r4:84729000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d2400 r8:8472902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84729000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84729000 r8:8027f5e8 r7:dfb19e60 r6:8474e280 r5:844d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474d240 INFO: task kworker/1:15:3183 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de3df000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:84468c00 r4:84468c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84468c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473d8c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84468c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf13000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cd38c r4:855cd000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cd38c r4:8474e100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84468c00 r8:8474e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e100 r8:8027f5e8 r7:dfb39e60 r6:8474e300 r5:84468c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746a00 INFO: task kworker/0:27:3184 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de732000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:84468000 r4:84468000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84468000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cdb80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84468000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca61000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ce38c r4:855ce000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ce38c r4:8474e380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84468000 r8:8474e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e380 r8:8027f5e8 r7:dfb39e60 r6:8474e400 r5:84468000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734240 INFO: task kworker/0:28:3187 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de855000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3189 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:8446ec00 r4:8446ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cd6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb003000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cf78c r4:855cf400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cf78c r4:8474e480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446ec00 r8:8474e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e480 r8:8027f5e8 r7:dfb39e60 r6:8474e500 r5:8446ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734380 INFO: task kworker/0:29:3189 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de855000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df985d84 r8:00000002 r7:60000113 r6:df985d8c r5:84469800 r4:84469800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84469800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df985e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9a80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84469800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba0b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e6f8c r4:847e6c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e6f8c r4:8474e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84469800 r8:8474e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e580 r8:8027f5e8 r7:dfb39e60 r6:8474e600 r5:84469800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf985fb0 to 0xdf985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734500 INFO: task kworker/0:30:3191 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: deb8a000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:8446d400 r4:8446d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856aa040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446d400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e778c r4:847e7400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e778c r4:8474e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446d400 r8:8474e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e700 r8:8027f5e8 r7:dfb39e60 r6:8474e780 r5:8446d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734680 INFO: task kworker/0:31:3193 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df021000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:8446a400 r4:8446a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856aa6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb7d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579438c r4:85794000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579438c r4:8474e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446a400 r8:8474e82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e800 r8:8027f5e8 r7:df9e9e60 r6:8474e880 r5:8446a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734680 INFO: task kworker/0:32:3195 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df0d4000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:8446b000 r4:8446b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895c00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446b000 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85794b8c r4:85794800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85794b8c r4:8474e900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446b000 r8:8474e92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e900 r8:8027f5e8 r7:dfb91e60 r6:8474e980 r5:8446b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734680 INFO: task kworker/0:33:3196 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df0d4000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:8446bc00 r4:8446bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f129000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd9d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ddf8c r4:858ddc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858ddf8c r4:8474ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446bc00 r8:8474ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ea00 r8:8027f5e8 r7:dfb81e60 r6:8474ea80 r5:8446bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734b00 INFO: task kworker/0:34:3199 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df852000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb9dd84 r8:00000002 r7:60000013 r6:dfb9dd8c r5:8446c800 r4:8446c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847db3c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446c800 r7:00000000 r6:83018000 r5:00001000 r4:7f241000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed057000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ee38c r4:847ee000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ee38c r4:8474eb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446c800 r8:8474eb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474eb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474eb00 r8:8027f5e8 r7:dfb81e60 r6:8474eb80 r5:8446c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734cc0 INFO: task kworker/0:35:3201 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df852000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:83aa3000 r4:83aa3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ae9c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa3000 r7:00000000 r6:83018000 r5:00001000 r4:7f177000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece73000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f238c r4:858f2000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858f238c r4:8474ec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa3000 r8:8474ec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ec00 r8:8027f5e8 r7:dfb9de60 r6:8474ec80 r5:83aa3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734cc0 INFO: task kworker/0:36:3203 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df852000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3205 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:83aa5400 r4:83aa5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575cf40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa5400 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579538c r4:85795000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579538c r4:8474ed00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa5400 r8:8474ed2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ed00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ed00 r8:8027f5e8 r7:dfb9de60 r6:8474ed80 r5:83aa5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734f00 INFO: task kworker/0:37:3205 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dfcd3000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:849e0000 r4:849e0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85946040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f247000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ee78c r4:847ee400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ee78c r4:8474ee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0000 r8:8474ee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ee00 r8:8027f5e8 r7:dfb9de60 r6:8474ee80 r5:849e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db100 INFO: task kworker/0:38:3207 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dfcd3000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:849e0c00 r4:849e0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f245000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed087000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847eeb8c r4:847ee800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847eeb8c r4:8474ef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:8474ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ef00 r8:8027f5e8 r7:dfb9de60 r6:8474ef80 r5:849e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db2c0 INFO: task kworker/0:39:3209 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e0103000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3211 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:849e1800 r4:849e1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85891780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f229000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf17000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85794f8c r4:85794c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85794f8c r4:84a50000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e1800 r8:84a5002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50000 r8:8027f5e8 r7:dfb9de60 r6:84a50080 r5:849e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db400 INFO: task kworker/0:40:3211 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e0103000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3213 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:849e2400 r4:849e2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847db780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f243000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed06f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847edf8c r4:847edc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847edf8c r4:84a50100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e2400 r8:84a5012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50100 r8:8027f5e8 r7:dfb9de60 r6:84a50180 r5:849e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db4c0 INFO: task kworker/0:41:3213 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 7f90c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:849e3c00 r4:849e3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587d800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4d7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596238c r4:85962000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596238c r4:84a50200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e3c00 r8:84a5022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50200 r8:8027f5e8 r7:dfb9de60 r6:84a50280 r5:849e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db680 INFO: task kworker/0:42:3215 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 7fe66000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3216 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:849e4800 r4:849e4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dba40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f23f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed03f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85797f8c r4:85797c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85797f8c r4:84a50300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e4800 r8:84a5032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50300 r8:8027f5e8 r7:dfb99e60 r6:84a50380 r5:849e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db680 INFO: task kworker/0:43:3216 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 7fe66000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3219 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:849e5400 r4:849e5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587d180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596138c r4:85961000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596138c r4:84a50400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e5400 r8:84a5042c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50400 r8:8027f5e8 r7:dfb99e60 r6:84a50480 r5:849e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db940 INFO: task kworker/0:44:3219 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8039a000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3221 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc2dd84 r8:00000002 r7:60000013 r6:dfc2dd8c r5:849e3000 r4:849e3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb3c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc5b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fef8c r4:857fec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fef8c r4:84729080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e3000 r8:847290ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84729080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84729080 r8:8027f5e8 r7:dfb19e60 r6:84a50500 r5:849e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474d500 INFO: task kworker/1:16:3221 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8039a000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3223 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:83aac800 r4:83aac800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aac800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aac800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc99000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ff78c r4:857ff400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ff78c r4:84729100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aac800 r8:8472912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84729100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84729100 r8:8027f5e8 r7:dfb19e60 r6:84729180 r5:83aac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474da40 INFO: task kworker/1:17:3223 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 808dd000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3225 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:83aab000 r4:83aab000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aab000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599b1c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aab000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed06d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a52b8c r4:85a52800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a52b8c r4:84a50580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aab000 r8:84a505ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50580 r8:8027f5e8 r7:dfc15e60 r6:84729200 r5:83aab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847dbdc0 INFO: task kworker/0:45:3225 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 808dd000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3227 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:83aa8000 r4:83aa8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862f80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa8000 r7:00000000 r6:83018000 r5:00001000 r4:7f32d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed61f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596338c r4:85963000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596338c r4:84a50600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8000 r8:84a5062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50600 r8:8027f5e8 r7:dfc09e60 r6:84729280 r5:83aa8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51080 INFO: task kworker/0:46:3227 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 80c54000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3229 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc59d84 r8:00000002 r7:60000013 r6:dfc59d8c r5:83aa8c00 r4:83aa8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862b00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f241000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed061000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847eff8c r4:847efc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847eff8c r4:84a50680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8c00 r8:84a506ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50680 r8:8027f5e8 r7:dfc09e60 r6:84729300 r5:83aa8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a511c0 INFO: task kworker/0:47:3229 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 80c54000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3232 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc31d84 r8:00000002 r7:60000113 r6:dfc31d8c r5:83aeec00 r4:83aeec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aeec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858721c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aeec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fff8c r4:857ffc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fff8c r4:84729380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aeec00 r8:847293ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84729380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84729380 r8:8027f5e8 r7:dfb19e60 r6:84729400 r5:83aeec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84797f40 INFO: task kworker/1:18:3232 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 80d8f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3233 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:8385d400 r4:8385d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8385d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599b040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8385d400 r7:00000000 r6:83018000 r5:00001000 r4:7f3ad000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed89d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5278c r4:85a52400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5278c r4:84a50700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8385d400 r8:84a5072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50700 r8:8027f5e8 r7:dfc09e60 r6:84729480 r5:8385d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:48:3233 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 81347000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3235 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc79d84 r8:00000002 r7:60000013 r6:dfc79d8c r5:8449b000 r4:8449b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ebcf5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8580838c r4:84729500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d20: 81838000 ecf31000 00000001 80239b98 7f37f000 00000001 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8449ec00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edafb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85a5378c r4:84a50780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8449ec00 r8:84a507ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50780 r8:8027f5e8 r7:dfc09e60 r6:84729600 r5:8449ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51400 INFO: task kworker/0:49:3238 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 81838000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3240 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:84498c00 r4:84498c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84498c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2300 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84498c00 r7:00000000 r6:83018000 r5:00001000 r4:7f437000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6db000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485478c r4:84854400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485478c r4:84a50800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84498c00 r8:84a5082c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edadb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8485538c r4:84855000 r10:61c88647 r9:8449c800 r8:84a508ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a51700 Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 81959000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3243 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:8449bc00 r4:8449bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8449bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed623000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8485438c r4:84a50900 Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) r4:84a518c0 Call trace: r4:00000000 r5:80000113 r4:80239bb0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 task:kworker/0:53 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c5940 r5:00001000 r4:edc81000 r5:85b1938c r4:85b19000 r10:00000000 r9:84a50980 r8:8027f5e8 r7:dfca5e60 r6:84729800 r5:84498000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918888 r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:8449e000 r4:8449e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8449e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b38d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8449e000 r7:00000000 r6:83018000 r5:00001000 r4:7f547000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb39000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5438c r4:85a54000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5438c r4:84a50a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8449e000 r8:84a50a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50a00 r8:8027f5e8 r7:dfca5e60 r6:84729880 r5:8449e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51d00 INFO: task kworker/0:54:3247 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 821a8000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3249 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed981000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:849a078c r4:84a50a80 Exception stack(0xdfce5fb0 to 0xdfce5ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3251 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918888 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:849c8000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfd41000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8485578c r4:84a50b00 Exception stack(0xdfcf5fb0 to 0xdfcf5ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc7b000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:849ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f53f000 r5:00001000 r4:edc67000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485638c r4:84856000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485638c r4:84a50c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ca400 r8:84a50c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50c00 r8:8027f5e8 r7:dfce5e60 r6:84729a80 r5:849ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847dbd40 INFO: task kworker/0:58:3255 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 82b06000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3258 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd2dd84 r8:00000002 r7:60000013 r6:dfd2dd8c r5:849cb000 r4:849cb000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cb000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd2de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b38780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f53d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc03000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485678c r4:84856400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485678c r4:84a50c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cb000 r8:84a50cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50c80 r8:8027f5e8 r7:dfce5e60 r6:84729b00 r5:849cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd2dfb0 to 0xdfd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed99d000 r5:8485738c r4:84857000 r10:61c88647 r9:849cbc00 r8:84a50d2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d20: 82f06000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3261 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc65d84 r8:00000002 r7:60000013 r6:dfc65d8c r5:849e6c00 r4:849e6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b383c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f539000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed597000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84856f8c r4:84856c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84856f8c r4:84a50d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e6c00 r8:84a50dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50d80 r8:8027f5e8 r7:dfce5e60 r6:84a50e00 r5:849e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5f240 INFO: task kworker/0:61:3261 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:62:3263 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:62 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd3dd84 r8:00000002 r7:60000013 r6:dfd3dd8c r5:849e6000 r4:849e6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed9b1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84856b8c r4:84856800 r7:dddced80 r6:83018000 r5:84856b8c r4:84a50e80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3267 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:3267 tgid:3267 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed999000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a038c r4:849a0000 r7:dddced80 r6:83018000 r5:849a038c r4:84a50f80 r10:00000000 r9:84a50f80 r8:8027f5e8 r7:dfce5e60 r6:84729d00 r5:849ce000 Workqueue: events bpf_prog_free_deferred 9d20: 834ee000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed969000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:849a0f8c r4:848a5000 Exception stack(0xdfd69fb0 to 0xdfd69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5f680 INFO: task kworker/0:64:3270 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 834ee000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3271 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918888 r9:dfd6dd84 r8:00000002 r7:60000113 r6:dfd6dd8c r5:849cc800 r4:00000000 r9:83018005 r8:849cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f607000 r5:00001000 r4:ecd87000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8485d78c r4:848a5080 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:3273 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd71d84 r8:00000002 r7:60000013 r6:dfd71d8c r5:84499800 r4:84499800 r5:84499800 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed93d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:849a0b8c r4:848a5100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84499800 r8:848a512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5100 r8:8027f5e8 r7:dfd6de60 r6:84729e80 r5:84499800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd71fb0 to 0xdfd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5fbc0 INFO: task kworker/0:66:3273 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 83b13000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed897000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a178c r4:849a1400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849a178c r4:848a5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84280000 r8:848a51ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5180 r8:8027f5e8 r7:dfd6de60 r6:84729f00 r5:84280000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5f980 INFO: task kworker/0:67:3275 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 Workqueue: events bpf_prog_free_deferred r5:84280c00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ecdab000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84280c00 r8:848a522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a5fb00 Call trace: 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:69 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd7dd84 r8:00000002 r7:60000113 r6:dfd7dd8c r5:84281800 r4:84281800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84281800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd7de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cd180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84281800 r7:00000000 r6:83018000 r5:00001000 r4:7f5f7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485cf8c r4:8485cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485cf8c r4:848a5280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84281800 r8:848a52ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5280 r8:8027f5e8 r7:dfd6de60 r6:848a6000 r5:84281800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd7dfb0 to 0xdfd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5fd40 INFO: task kworker/0:69:3279 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 84670000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:85a3578c r4:85a35400 r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:70 state:D stack:0 pid:3282 tgid:3282 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:84282400 r7:00000000 r6:83018000 r5:00001000 r4:7f6d1000 r5:00001000 r4:ed583000 r5:849a138c r4:849a1000 r10:61c88647 r9:84282400 r8:848a532c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 84670000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3283 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd85d84 r8:00000002 r7:60000113 r6:dfd85d8c r5:84283000 r4:84283000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84283000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd85e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3df000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a1b8c r4:849a1800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85a3578c r4:85a35400 r4:848b5600 r4:00000001 r4:847da040 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84283c00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eccf7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdfd89fb0 to 0xdfd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a2200 INFO: task kworker/0:72:3286 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 84b9e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:3287 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd8dd84 r8:00000002 r7:60000113 r6:dfd8dd8c r5:84284800 r4:84284800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84284800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc8a40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84284800 r7:00000000 r6:83018000 r5:00001000 r4:7f607000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc2d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485df8c r4:8485dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485df8c r4:848a5480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84284800 r8:848a54ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5480 r8:8027f5e8 r7:dfd89e60 r6:848a6200 r5:84284800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd8dfb0 to 0xdfd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a22c0 INFO: task kworker/0:73:3287 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 84e39000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3289 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd91d84 r8:00000002 r7:60000113 r6:dfd91d8c r5:84285400 r4:84285400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84285400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd91e08 r4:00000000 r5:00001000 r4:ed33b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a1f8c r4:849a1c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:848a5500 r8:8027f5e8 r7:dfd89e60 r6:848a6280 r5:84285400 Workqueue: events bpf_prog_free_deferred 9d20: 84e39000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd9de08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed247000 r5:8485c38c r4:8485c000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8531e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3294 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3294 tgid:3294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfda5d84 r8:00000002 r7:60000013 r6:dfda5d8c r5:849b1800 r4:849b1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a2e00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f6b5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb43000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485fb8c r4:8485f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485fb8c r4:848a5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b1800 r8:848a562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5600 r8:8027f5e8 r7:dfd89e60 r6:848a6380 r5:849b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda5fb0 to 0xdfda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:848a2780 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:77 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed157000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485cb8c r4:848a5680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b2400 r8:848a56ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5680 r8:8027f5e8 r7:dfd89e60 r6:848a6400 r5:849b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda9fb0 to 0xdfda9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a2680 INFO: task kworker/0:77:3295 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 85769000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3297 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:849b0c00 r4:82918884 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed097000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485d38c r4:8485d000 r7:dddced80 r6:83018000 r5:8485d38c r4:848a5700 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:847da040 task:kworker/0:79 state:D stack:0 pid:3299 tgid:3299 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b4600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f6c5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecffb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485db8c r4:8485d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485db8c r4:848a5780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b4800 r8:848a57ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5780 r8:8027f5e8 r7:dfd89e60 r6:848a6500 r5:849b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb9fb0 to 0xdfdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a2700 INFO: task kworker/0:79:3299 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 85abb000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf1b000 r5:8485e78c r4:8485e400 r10:61c88647 r9:849b3c00 r8:848a582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a2b00 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:3303 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:3303 tgid:3303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfdc9d84 r8:00000002 r7:60000113 r6:dfdc9d8c r5:849b6000 r4:849b6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc9e08 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eceaf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfdc9fb0 to 0xdfdc9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a2c40 INFO: task kworker/0:81:3303 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 86037000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ece1b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485eb8c r4:8485e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 86037000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd5e08 r5:00001000 r4:ecdeb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485c78c r4:8485c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:848a5980 r8:8027f5e8 r7:dfd89e60 r6:848a6700 r5:849b6c00 r4:848a2e80 r4:00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84286c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6bb000 r5:00001000 r4:ecdd3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485f78c r4:8485f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485f78c r4:848a5a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84286c00 r8:848a5a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5a00 r8:8027f5e8 r7:dfd89e60 r6:848a6780 r5:84286c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4280 INFO: task kworker/0:84:3309 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 86b71000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:849f0000 r4:82918884 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecd8b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485f38c r4:848a5a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f0000 r8:848a5aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5a80 r8:8027f5e8 r7:dfd89e60 r6:848a6800 r5:849f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfde5fb0 to 0xdfde5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4280 INFO: task kworker/0:85:3311 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 86fe1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:86:3313 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:3313 tgid:3313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfdedd84 r8:00000002 r7:60000113 r6:dfdedd8c r5:849f1800 r4:849f1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a2b80 r4:00000000 r5:00001000 r4:dfac3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485ef8c r4:8485ec00 r7:dddced80 r6:83018000 r5:8485ef8c r4:848a5b80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:82918888 r9:dfdf5d84 r8:00000002 r7:60000113 r6:dfdf5d8c r5:849f0c00 r4:849f0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5f700 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f789000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb7b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7238c r4:85a72000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7238c r4:848a5b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f0c00 r8:848a5b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5b00 r8:8027f5e8 r7:dfdede60 r6:848a6900 r5:849f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdf5fb0 to 0xdfdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4500 INFO: task kworker/0:87:3315 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 875f3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed4d5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r5:00001000 r4:ecf8f000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3320 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3320 tgid:3320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfdf9d84 r8:00000002 r7:60000013 r6:dfdf9d8c r5:849f3000 r4:849f3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872bc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf09000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580ab8c r4:8580a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580ab8c r4:848a6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f3000 r8:848a69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a6980 r8:8027f5e8 r7:dfd49e60 r6:848a6a00 r5:849f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdf9fb0 to 0xdfdf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ba600 INFO: task kworker/1:21:3320 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 875f3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:3323 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:3323 tgid:3323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfe1dd84 r8:00000002 r7:60000113 r6:dfe1dd8c r5:849f5400 r4:849f5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe1de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856adf80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f787000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb17000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a72b8c r4:85a72800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a72b8c r4:848a5d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f5400 r8:848a5d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5d00 r8:8027f5e8 r7:dfdcde60 r6:848a6a80 r5:849f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe1dfb0 to 0xdfe1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4d40 INFO: task kworker/0:89:3323 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 87be5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:90:3325 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:90 state:D stack:0 pid:3325 tgid:3325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfe25d84 r8:00000002 r7:60000113 r6:dfe25d8c r5:849f4800 r4:849f4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe25e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b4d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f773000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed433000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a72f8c r4:85a72c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a72f8c r4:848a5d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f4800 r8:848a5dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5d80 r8:8027f5e8 r7:dfdcde60 r6:848a6b00 r5:849f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe25fb0 to 0xdfe25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4b40 INFO: task kworker/0:90:3325 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 87be5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed9eb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:3328 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:3328 tgid:3328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfe21d84 r8:00000002 r7:60000113 r6:dfe21d8c r5:8487bc00 r4:8487bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe21e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb80c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f771000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed051000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7278c r4:85a72400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7278c r4:848a5f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487bc00 r8:848a5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5f00 r8:8027f5e8 r7:dfe25e60 r6:848a5f80 r5:8487bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe21fb0 to 0xdfe21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4f80 INFO: task kworker/0:92:3328 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 87be5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/0:93:3331 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:93 state:D stack:0 pid:3331 tgid:3331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfe4dd84 r8:00000002 r7:60000113 r6:dfe4dd8c r5:849f6000 r4:849f6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe4de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb8580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f76f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7138c r4:85a71000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7138c r4:84a7f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f6000 r8:84a7f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7f000 r8:8027f5e8 r7:dfe21e60 r6:848a6b80 r5:849f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe4dfb0 to 0xdfe4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4f80 INFO: task kworker/0:93:3331 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe69e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3f000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84a7f180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ee3b3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85cac78c r4:85cac400 r10:61c88647 r9:849f2400 r8:84a7f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a84000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 882e6000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3339 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3339 tgid:3339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfe89d84 r8:00000002 r7:60000113 r6:dfe89d8c r5:84870000 r4:84870000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84870000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe89e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85870880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84870000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580df8c r4:8580dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580df8c r4:848a6d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84870000 r8:848a6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a6d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfe89fb0 to 0xdfe89ff8) r4:848ba940 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee533000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cacf8c r4:85cacc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cacf8c r4:84a7f200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84870c00 r8:84a7f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7f200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7f200 r8:8027f5e8 r7:dfe55e60 r6:848a6e80 r5:84870c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe95fb0 to 0xdfe95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a842c0 INFO: task kworker/0:97:3340 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 88737000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:23:3359 blocked for more than 452 seconds. r4:84286000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfebde08 r5:00001000 r4:ec9a5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580d78c r4:8580d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a94280 r8:8027f5e8 r7:dfd49e60 r6:84a94300 r5:84286000 r4:84a99540 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:dfec1d84 r8:00000002 r7:60000113 r6:dfec1d8c r5:849b3000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ec945000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580cf8c r4:8580cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580cf8c r4:84a94400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3000 r8:84a9442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a94400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a94400 r8:8027f5e8 r7:dfd49e60 r6:84a94480 r5:849b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfec1fb0 to 0xdfec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a99840 INFO: task kworker/1:24:3363 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 89092000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3365 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3365 tgid:3365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfec5d84 r8:00000002 r7:60000113 r6:dfec5d8c r5:84a38000 r4:84a38000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a38000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85870380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a38000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec931000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580c78c r4:8580c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580c78c r4:84a94500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38000 r8:84a9452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a94500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a94500 r8:8027f5e8 r7:dfd49e60 r6:84a94580 r5:84a38000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfec5fb0 to 0xdfec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3367 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3367 tgid:3367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfec9d84 r8:00000002 r7:60000113 r6:dfec9d8c r5:84a38c00 r4:84a38c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a38c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85870200 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec921000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580bf8c r4:8580bc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580bf8c r4:84a94600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38c00 r8:84a9462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a94600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a94600 r8:8027f5e8 r7:dfd49e60 r6:84a94680 r5:84a38c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfec9fb0 to 0xdfec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a99bc0 INFO: task kworker/1:26:3367 is blocked on a mutex likely owned by task kworker/1:364:4416. Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8487e000 r4:82918884 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487e000 r7:00000000 r6:83018000 r5:00001000 r4:7f8b5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df955000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cad78c r4:85cad400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cad78c r4:84a7f880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487e000 r8:84a7f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7f880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7f880 r8:8027f5e8 r7:dfc89e60 r6:84a7f900 r5:8487e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfed5fb0 to 0xdfed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a91240 INFO: task kworker/0:108:3373 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 89c7b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff25000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:285:4302 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:285 state:D stack:0 pid:4302 tgid:4302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:85150000 r4:85150000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85150000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a88d80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e08a9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851a838c r4:84a82f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150000 r8:84a82fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a82f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82f80 r8:8027f5e8 r7:e8ac5e60 r6:84721000 r5:85150000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84744900 INFO: task kworker/0:285:4302 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 89c7b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8516c800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 r5:00001000 r4:eab4d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8516c800 r8:848b58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d20: 8a13b000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4430 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4430 tgid:4430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaec1d84 r8:00000002 r7:60000113 r6:eaec1d8c r5:85155400 r4:85155400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85155400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85155400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a0b8c r4:851a0800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a0b8c r4:848b5980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85155400 r8:848b59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5980 r8:8027f5e8 r7:eaeb1e60 r6:84721f80 r5:85155400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec1fb0 to 0xeaec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9540 INFO: task kworker/1:371:4430 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8a13b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84a28000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 r5:00001000 r4:e0925000 r7:ddde2d80 r6:83018200 r5:851a0f8c r4:848b5a00 r4:00000001 Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf98c0 INFO: task kworker/1:372:4432 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8a4b2000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:4434 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84a29800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:00001000 r4:eacd3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851a1f8c r4:848b5a80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8a4b2000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 task:kworker/1:374 state:D stack:0 pid:4437 tgid:4437 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eac77000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:4439 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaee5d84 r8:00000002 r7:60000113 r6:eaee5d8c r5:84a2a400 r4:84a2a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475a140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa21000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a238c r4:851a2000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a238c r4:848b5b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2a400 r8:848b5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5b80 r8:8027f5e8 r7:eaed1e60 r6:847d3180 r5:84a2a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee5fb0 to 0xeaee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9a00 INFO: task kworker/1:375:4439 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8ada3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:dfb71000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851a278c r4:851a2400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a278c r4:848b5c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2bc00 r8:848b5c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5c00 r8:8027f5e8 r7:eaee5e60 r6:847d3200 r5:84a2bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9f80 INFO: task kworker/1:376:4441 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8b1b6000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/1:377:4442 blocked for more than 452 seconds. r4:84a2b000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847910c0 r5:00001000 r4:dfa8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:851a1b8c r4:848b5c80 dfa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:378:4444 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:378 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaef5d84 r8:00000002 r7:60000013 r6:eaef5d8c r5:84a2c800 r4:84a2c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a88000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd9f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a2b8c r4:851a2800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a2b8c r4:848b5d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2c800 r8:848b5d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5d00 r8:8027f5e8 r7:eaee9e60 r6:847d3300 r5:84a2c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9e80 INFO: task kworker/1:378:4444 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8b5e1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:851d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:00001000 r4:e0775000 r5:851a3b8c r4:851a3800 r10:61c88647 r9:851d2400 r8:848b5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a881c0 r5:00001000 r4:e0017000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5e80 r8:8027f5e8 r7:eadf1e60 r6:848b5f00 r5:851d3000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a88300 INFO: task kworker/1:380:4448 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8b8dc000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:4450 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4450 tgid:4450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eadf5d84 r8:00000002 r7:60000113 r6:eadf5d8c r5:851d3c00 r4:851d3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a88480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0147000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a378c r4:851a3400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a378c r4:848b5f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d3c00 r8:848b5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5f80 r8:8027f5e8 r7:eadf1e60 r6:84a9d000 r5:851d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf5fb0 to 0xeadf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a88180 INFO: task kworker/1:381:4450 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8b8dc000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eaf01d84 r8:00000002 r7:60000013 r6:eaf01d8c r5:851d4800 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a88500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a338c r4:851a3000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a338c r4:84a9d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d4800 r8:84a9d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9d080 Exception stack(0xeaf01fb0 to 0xeaf01ff8) r4:84a88280 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c5000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8c21a000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4458 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4458 tgid:4458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaf15d84 r8:00000002 r7:60000013 r6:eaf15d8c r5:851d6c00 r4:851d6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:851d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:00001000 r4:e09ed000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851a938c r4:851a9000 r10:61c88647 r9:851d6c00 r8:84a9d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e0939000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851a878c r4:84a9d380 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a88b40 INFO: task kworker/1:385:4460 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8c673000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:286:4461 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:84a2d400 r4:84a2d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08f5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e178c r4:847e1400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e178c r4:847d3380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2d400 r8:847d33ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847d3380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d3380 r8:8027f5e8 r7:e8ac5e60 r6:847d3400 r5:84a2d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a8900 INFO: task kworker/0:286:4461 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 8cb60000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/0:287:4464 blocked for more than 452 seconds. r10:82918888 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:84a2ec00 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e4a4d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:847e0f8c r4:847d3480 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:386 state:D stack:0 pid:4466 tgid:4466 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b8040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0983000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a8f8c r4:851a8c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a8f8c r4:84a9d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2e000 r8:84a9d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9d480 r8:8027f5e8 r7:eaf15e60 r6:847d3580 r5:84a2e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf05fb0 to 0xeaf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a88c00 INFO: task kworker/1:386:4466 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8cb60000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8aab000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8cb60000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:4471 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaf21d84 r8:00000002 r7:60000113 r6:eaf21d8c r5:8516ec00 r4:8516ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a8d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:848b85c0 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:eaf2dd84 r8:00000002 r7:60000113 r6:eaf2dd8c r5:85170000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ead9f000 r5:847e078c r4:847e0400 r10:61c88647 r9:85170000 r8:847d372c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d20: 8d41f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4475 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4475 tgid:4475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaf31d84 r8:00000002 r7:60000113 r6:eaf31d8c r5:85170c00 r4:85170c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85170c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b8780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85170c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab11000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a9f8c r4:851a9c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcf000 r7:ddde2d80 r6:83018200 r5:851a9b8c r4:84a9d680 r4:00000001 r4:848b8180 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:4478 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:391 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaf39d84 r8:00000002 r7:60000113 r6:eaf39d8c r5:85172400 r4:85172400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85172400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b8800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85172400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab33000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aa38c r4:851aa000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aa38c r4:84a9d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85172400 r8:84a9d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9d700 r8:8027f5e8 r7:eaf35e60 r6:847d3900 r5:85172400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf39fb0 to 0xeaf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b8180 INFO: task kworker/1:391:4478 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8de64000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4d000 r5:851aab8c r4:851aa800 r4:84a9d800 5fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf49e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ab240 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85173000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead6f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ac38c r4:851ac000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ac38c r4:84a9d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85173000 r8:84a9d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9d780 r8:8027f5e8 r7:eaf45e60 r6:847d3a00 r5:85173000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b8b00 INFO: task kworker/1:393:4482 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8e286000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:eaf51d84 r8:00000002 r7:60000013 r6:eaf51d8c r5:85176000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eace7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaf51fb0 to 0xeaf51ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08 r9:83018205 r8:85176c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:00001000 r4:eacf7000 r7:ddde2d80 r6:83018200 r5:851ab38c r4:84a9d900 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8e616000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4488 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4488 tgid:4488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaf61d84 r8:00000002 r7:60000113 r6:eaf61d8c r5:85173c00 r4:85173c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85173c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b8d00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aa78c r4:851aa400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aa78c r4:84a9d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85173c00 r8:84a9d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9d980 r8:8027f5e8 r7:eaf49e60 r6:847d3b80 r5:85173c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf61fb0 to 0xeaf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b8c80 INFO: task kworker/1:396:4488 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 9d20: 8e837000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85178c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 r5:00001000 r4:ead1d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851abb8c r4:851ab800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851abb8c r4:84a9da00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85178c00 r8:84a9da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9da00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9da00 r8:8027f5e8 r7:eaf49e60 r6:847d3c00 r5:85178c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b8e00 INFO: task kworker/1:397:4490 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8ed09000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eaf71d84 r8:00000002 r7:60000113 r6:eaf71d8c r5:85178000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ead2f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:851abf8c r4:84a9da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85178000 r8:84a9daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9da80 r8:8027f5e8 r7:eaf49e60 r6:847d3c80 r5:85178000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf71fb0 to 0xeaf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a88f00 INFO: task kworker/1:398:4492 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8ed09000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead47000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8519fb8c r4:8519f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a88f00 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8f263000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8517a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 r5:00001000 r4:ead5f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8517a400 r8:84a9dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r4:00000000 r5:00001000 r4:df9f7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851acf8c r4:84a9dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9dc00 r8:8027f5e8 r7:eaf49e60 r6:847d3e00 r5:8517c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ab140 INFO: task kworker/1:401:4498 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8f263000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:4500 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8517d400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ab380 r5:00001000 r4:ead7d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8f263000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaf9dd84 r8:00000002 r7:60000013 r6:eaf9dd8c r5:8517bc00 r4:8517bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8517bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ab5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8517bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851acb8c r4:851ac800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851acb8c r4:84a9dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517bc00 r8:84a9dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9dd00 r8:8027f5e8 r7:eaf91e60 r6:847d3f00 r5:8517bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ab3c0 INFO: task kworker/1:403:4502 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8fd38000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ab800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8517e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadad000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ad38c r4:851ad000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ad38c r4:84a9dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517e000 r8:84a9ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9dd80 r8:8027f5e8 r7:eaf91e60 r6:847d3f80 r5:8517e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ab6c0 INFO: task kworker/1:404:4505 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8fd38000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dfc81000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:847e138c r4:85223000 r10:00000000 r9:85223000 r8:8027f5e8 r7:e8ac5e60 r6:85223080 r5:8517ec00 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbf000 r5:851ad78c r4:851ad400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ad78c r4:84a9de00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517b000 r8:84a9de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9de00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9de00 r8:8027f5e8 r7:eaf91e60 r6:85223100 r5:8517b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ab880 INFO: task kworker/1:405:4508 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 902fa000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:4512 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e062d000 r7:ddde2d80 r6:83018200 r5:851aef8c r4:84a9de80 Workqueue: events bpf_prog_free_deferred r4:eae89dc0 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:00001000 r4:dfa49000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84a9df00 r8:8027f5e8 r7:eafade60 r6:85223200 r5:84a42400 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 908f5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84a43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:00001000 r4:dfbf9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a9df80 r8:8027f5e8 r7:eafade60 r6:85223280 r5:84a43c00 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:dfcc9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a43000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a43000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848abe40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a43000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ae78c r4:851ae400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ae78c r4:8521f080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a43000 r8:8521f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521f080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521f080 r8:8027f5e8 r7:eafade60 r6:85223380 r5:84a43000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc9fb0 to 0xeafc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848abf80 INFO: task kworker/1:410:4518 is blocked on a mutex likely owned by task kworker/1:364:4416. [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:00001000 r4:ecf8f000 Exception stack(0xeae89fb0 to 0xeae89ff8) Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eafd1d84 r8:00000002 r7:60000013 r6:eafd1d8c r5:84a40000 r4:84a40000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a40000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7fc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a40000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00dd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aeb8c r4:851ae800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aeb8c r4:8521f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a40000 r8:8521f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521f100 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9107f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:00001000 r4:ecf8f000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r9:83018205 r8:84a44800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e091f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851afb8c r4:851af800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851afb8c r4:8521f180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeafd9fb0 to 0xeafd9ff8) [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:80000113 r4:80239bb0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:4527 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:4527 tgid:4527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:84a45400 r4:84a45400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a45400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847534c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a45400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead33000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b038c r4:851b0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851b038c r4:8521f280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:eab59000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80000113 r4:80239bb0 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4531 tgid:4531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaff1d84 r8:00000002 r7:60000013 r6:eaff1d8c r5:85229800 r4:85229800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85229800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84753200 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85229800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac81000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aff8c r4:851afc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aff8c r4:8521f380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8521f380 r8:8027f5e8 r7:eafe1e60 r6:85223680 r5:85229800 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eae4b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851b1f8c r4:8521f400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b078c r4:851b0400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851b078c r4:8521f480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522a400 r8:8521f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521f480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521f480 r8:8027f5e8 r7:eaff9e60 r6:85223780 r5:8522a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84753680 INFO: task kworker/1:418:4535 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 91f4f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:419 state:D stack:0 pid:4537 tgid:4537 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84753880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8522b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b0f8c r4:851b0c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851b0f8c r4:8521f500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522b000 r8:8521f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521f500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521f500 r8:8027f5e8 r7:eaff9e60 r6:85223800 r5:8522b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:85a3578c r4:85a35400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8522bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b138c r4:851b1000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851b138c r4:8521f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522bc00 r8:8521f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521f580 r8:8027f5e8 r7:eaff9e60 r6:85223880 r5:8522bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84753840 INFO: task kworker/1:420:4539 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 923ef000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:4541 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:4541 tgid:4541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb019d84 r8:00000002 r7:60000113 r6:eb019d8c r5:8522e000 r4:8522e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8522e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84753b00 r5:00001000 r4:eae1b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:851b178c r4:8521f600 9fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:8522ec00 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eae2b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b0b8c r4:851b0800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851b0b8c r4:8521f700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522d400 r8:8521f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521f700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521f700 r8:8027f5e8 r7:eaff9e60 r6:85223a00 r5:8522d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb029fb0 to 0xeb029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84753c00 INFO: task kworker/1:423:4545 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 932b3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:4547 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae73000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851b2b8c r4:8521f780 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:425 state:D stack:0 pid:4549 tgid:4549 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae63000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b278c r4:851b2400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851b278c r4:8521f800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a46c00 r8:8521f82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521f800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521f800 r8:8027f5e8 r7:eb02de60 r6:85223b00 r5:84a46c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84753f00 INFO: task kworker/1:425:4549 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 932b3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb051000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8526038c r4:85260000 r10:61c88647 r9:848f8000 r8:8521f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r5:80000113 r4:80239bb0 r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:848f8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd5e08 r5:00001000 r4:eae83000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851b2f8c r4:851b2c00 r10:61c88647 r9:848f8c00 r8:8521f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d20: 93dca000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:4556 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4556 tgid:4556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb065d84 r8:00000002 r7:60000013 r6:eb065d8c r5:848fb000 r4:848fb000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fb000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842f2100 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae93000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b238c r4:851b2000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851b238c r4:8521f980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fb000 r8:8521f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521f980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521f980 r8:8027f5e8 r7:eb03de60 r6:85223c80 r5:848fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb065fb0 to 0xeb065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842f2380 INFO: task kworker/1:428:4556 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 93dca000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:429:4558 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb06dd84 r8:00000002 r7:60000013 r6:eb06dd8c r5:848f9800 r4:848f9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaea3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b378c r4:851b3400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8521fa00 r8:8027f5e8 r7:eb03de60 r6:85223d00 r5:848f9800 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:430 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r5:00001000 r4:eaeb3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b3b8c r4:851b3800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851b3b8c r4:8521fa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dbc00 r8:8521faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521fa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521fa80 r8:8027f5e8 r7:eb03de60 r6:8521fb00 r5:851dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842f24c0 INFO: task kworker/1:430:4559 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9442e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:4561 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:4561 tgid:4561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb075d84 r8:00000002 r7:60000113 r6:eb075d8c r5:851dc800 r4:851dc800 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaecb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:851b338c r4:8521fb80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 9442e000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:851dd400 r4:851dd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842f2880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf83000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b3f8c r4:851b3c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851b3f8c r4:8521fc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dd400 r8:8521fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521fc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521fc80 r8:8027f5e8 r7:eb03de60 r6:8521fd00 r5:851dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842f2900 INFO: task kworker/1:432:4564 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9442e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851de000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb0eb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85260f8c r4:8521fd80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 94e0d000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:851dec00 r4:00000000 r4:00000000 r5:00001000 r4:eb097000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85260b8c r4:85260800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85260b8c r4:8521fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dec00 r8:8521feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521fe80 r8:8027f5e8 r7:eb07de60 r6:8521ff00 r5:851dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf3dfb0 to 0xeaf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842f2c40 INFO: task kworker/1:434:4567 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 94e0d000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:4570 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb085d84 r8:00000002 r7:60000013 r6:eb085d8c r5:851db000 r4:851db000 r5:851db000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb0a7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526078c r4:85260400 r7:ddde2d80 r6:83018200 r5:8526078c r4:8521ff80 Exception stack(0xeb085fb0 to 0xeb085ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:436 state:D stack:0 pid:4571 tgid:4571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb0a5d84 r8:00000002 r7:60000113 r6:eb0a5d8c r5:851d8000 r4:851d8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221c00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0bf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526138c r4:85261000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526138c r4:842f0080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d8000 r8:842f00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842f0080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842f0080 r8:8027f5e8 r7:eb07de60 r6:842f0100 r5:851d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a5fb0 to 0xeb0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85221640 INFO: task kworker/1:436:4571 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 94fa8000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/1:437:4573 blocked for more than 453 seconds. r4:851da400 r4:00000000 r9:83018205 r8:851da400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526178c r4:85261400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526178c r4:842f0180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851da400 r8:842f01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842f0180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842f0180 r8:8027f5e8 r7:eb07de60 r6:842f0200 r5:851da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84753e40 INFO: task kworker/1:437:4573 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 953dc000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:4575 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb0cdd84 r8:00000002 r7:60000113 r6:eb0cdd8c r5:851d9800 r4:851d9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:851d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:00001000 r4:dfa0d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851d9800 r8:842f02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842f0280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842f0280 r8:8027f5e8 r7:eb07de60 r6:842f0300 r5:851d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84722040 INFO: task kworker/1:438:4575 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 9d20: 953dc000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e00e5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85262f8c r4:85262c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85175400 r8:842f03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:4582 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:4582 tgid:4582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaed5d84 r8:00000002 r7:60000113 r6:eaed5d8c r5:848fbc00 r4:848fbc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fbc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84996140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0219000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520878c r4:85208400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520878c r4:85223d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fbc00 r8:85223dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223d80 r8:8027f5e8 r7:e8ac5e60 r6:85223e00 r5:848fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8479ec00 INFO: task kworker/0:290:4582 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 95d5e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b3000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85223e80 r8:8027f5e8 r7:eaed5e60 r6:85223f00 r5:848fc800 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb0f5d84 r8:00000002 r7:60000113 r6:eb0f5d8c r5:848fd400 r4:848fd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84996480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0773000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85208b8c r4:85208800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85208b8c r4:85223f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fd400 r8:85223fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223f80 r8:8027f5e8 r7:eaed5e60 r6:8413d000 r5:848fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f5fb0 to 0xeb0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84996080 INFO: task kworker/0:292:4586 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 962a0000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:848fe000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r5:00001000 r4:e0265000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848fe000 r8:8413d0ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84996080 INFO: task kworker/0:293:4587 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 962a0000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:4590 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:4590 tgid:4590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb101d84 r8:00000002 r7:60000013 r6:eb101d8c r5:848fa400 r4:848fa400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fa400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84996900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e09fb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85209b8c r4:85209800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85209b8c r4:8413d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fa400 r8:8413d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d180 r8:8027f5e8 r7:eb0f5e60 r6:8413d200 r5:848fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84996080 INFO: task kworker/0:294:4590 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 966be000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:4591 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:4591 tgid:4591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb105d84 r8:00000002 r7:60000113 r6:eb105d8c r5:851d8c00 r4:851d8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722d80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a8b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85261f8c r4:85261c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85261f8c r4:842f0480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d8c00 r8:842f04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842f0480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842f0480 r8:8027f5e8 r7:eb0e9e60 r6:8413d280 r5:851d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb105fb0 to 0xeb105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84722540 INFO: task kworker/1:440:4591 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 96c58000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:295:4592 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:295 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb109d84 r8:00000002 r7:60000013 r6:eb109d8c r5:85240000 r4:85240000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85240000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84996800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85240000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07cf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520938c r4:85209000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520938c r4:8413d300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85240000 r8:8413d32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d300 r8:8027f5e8 r7:eb101e60 r6:8413d380 r5:85240000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84996640 INFO: task kworker/0:295:4592 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 96c58000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:4594 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:4594 tgid:4594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:84a0d400 r4:84a0d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a0d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849968c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08e3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520978c r4:85209400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520978c r4:8413d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0d400 r8:8413d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d400 r8:8027f5e8 r7:eb101e60 r6:842f0500 r5:84a0d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb10dfb0 to 0xeb10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849965c0 INFO: task kworker/0:296:4594 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9722b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:4596 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb115d84 r8:00000002 r7:60000113 r6:eb115d8c r5:851e0000 r4:851e0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb115e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84996b00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e092f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85209f8c r4:85209c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85209f8c r4:8413d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e0000 r8:8413d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d480 r8:8027f5e8 r7:eb101e60 r6:842f0580 r5:851e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb115fb0 to 0xeb115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84996a80 INFO: task kworker/0:297:4596 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9722b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4598 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4598 tgid:4598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:851e1800 r4:851e1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84996bc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0985000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520a38c r4:8520a000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520a38c r4:8413d500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e1800 r8:8413d52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d500 r8:8027f5e8 r7:eb101e60 r6:842f0600 r5:851e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84996940 INFO: task kworker/0:298:4598 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4600 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:4600 tgid:4600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb125d84 r8:00000002 r7:60000013 r6:eb125d8c r5:851e3000 r4:851e3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84843080 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaced000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520b38c r4:8520b000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520b38c r4:8413d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e3000 r8:8413d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d580 r8:8027f5e8 r7:eb101e60 r6:842f0680 r5:851e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84996c00 INFO: task kworker/0:299:4600 is blocked on a mutex likely owned by task kworker/1:364:4416. Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:4601 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb129d84 r8:00000002 r7:60000113 r6:eb129d8c r5:851e0c00 r4:851e0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e8af7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520a78c r4:8520a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851e0c00 r8:8413d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84996ac0 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:4604 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb0fdd84 r8:00000002 r7:60000113 r6:eb0fdd8c r5:851e3c00 r4:851e3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84831500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526278c r4:85262400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526278c r4:842f0780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e3c00 r8:842f07ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842f0780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842f0780 r8:8027f5e8 r7:eb0e9e60 r6:842f0800 r5:851e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0fdfb0 to 0xeb0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84722d40 INFO: task kworker/1:441:4604 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 97c2c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:4606 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:4606 tgid:4606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:851e5400 r4:851e5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab23000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520af8c r4:8520ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8413d680 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) r5:80000113 r4:80239bb0 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:4609 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:4609 tgid:4609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb13dd84 r8:00000002 r7:60000113 r6:eb13dd8c r5:851e6000 r4:851e6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84843040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab95000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520ab8c r4:8520a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520ab8c r4:8413d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e6000 r8:8413d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d700 r8:8027f5e8 r7:eb125e60 r6:842f0900 r5:851e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r4:00000000 r5:80000113 r4:80239bb0 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:303:4610 blocked for more than 453 seconds. Call trace: r4:851e6c00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eac59000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520b78c r4:8520b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520b78c r4:8413d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e6c00 r8:8413d7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d780 r8:8027f5e8 r7:eb125e60 r6:842f0980 r5:851e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84843080 INFO: task kworker/0:303:4610 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 98ca0000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:4613 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:4613 tgid:4613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb14dd84 r8:00000002 r7:60000013 r6:eb14dd8c r5:851e4800 r4:851e4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb14de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84843780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520bb8c r4:8520b800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520bb8c r4:8413d800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e4800 r8:8413d82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d800 r8:8027f5e8 r7:eb125e60 r6:842f0a00 r5:851e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb14dfb0 to 0xeb14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84843240 INFO: task kworker/0:304:4613 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 98ca0000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4614 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4614 tgid:4614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb159d84 r8:00000002 r7:60000113 r6:eb159d8c r5:851e8000 r4:851e8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ead0b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520bf8c r4:8520bc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520bf8c r4:8413d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e8000 r8:8413d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8413d880 r8:8027f5e8 r7:eb14de60 r6:842f0a80 r5:851e8000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d20: 9940c000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4616 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:851e9800 r4:851e9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848435c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead23000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a738c r4:850a7000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a738c r4:8413d900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e9800 r8:8413d92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d900 r8:8027f5e8 r7:eb14de60 r6:842f0b00 r5:851e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84843400 INFO: task kworker/0:306:4616 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9940c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85212b8c r4:85212800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85212b8c r4:8413d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e8c00 r8:8413d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413d980 r8:8027f5e8 r7:eb14de60 r6:842f0b80 r5:851e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84843740 INFO: task kworker/0:307:4618 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 99a56000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4620 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4620 tgid:4620 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918888 r9:eb171d84 r8:00000002 r7:60000113 r6:eb171d8c r5:851ea400 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918888 r9:eb179d84 r8:00000002 r7:60000013 r6:eb179d8c r5:851eb000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84843900 r5:00001000 r4:ead71000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85210b8c r4:8413da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851eb000 r8:8413daac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413da80 r8:8027f5e8 r7:eb169e60 r6:842f0c80 r5:851eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb179fb0 to 0xeb179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84843a80 INFO: task kworker/0:309:4622 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 99f83000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4624 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:851ebc00 r4:851ebc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ebc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84843a80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead87000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85210f8c r4:85210c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85210f8c r4:8413db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ebc00 r8:8413db2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413db00 r8:8027f5e8 r7:eb169e60 r6:842f0d00 r5:851ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84843b40 INFO: task kworker/0:310:4624 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 99f83000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Not tainted 6.15.0-syzkaller #0 Call trace: r4:851ec800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r5:00001000 r4:ead9b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851ec800 r8:8413dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84843a40 Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9a128000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:4628 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb18dd84 r8:00000002 r7:60000113 r6:eb18dd8c r5:851ee000 r4:851ee000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ee000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eadaf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521178c r4:85211400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:313 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r5:00001000 r4:eadc5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8521138c r4:8413dc80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4632 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb19dd84 r8:00000002 r7:60000013 r6:eb19dd8c r5:851eec00 r4:851eec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851eec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722a80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85211f8c r4:85211c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85211f8c r4:8413dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851eec00 r8:8413dd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413dd00 r8:8027f5e8 r7:eb169e60 r6:842f0f00 r5:851eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84722740 INFO: task kworker/0:314:4632 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaef1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85211b8c r4:85211800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a0000 r8:8413ddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413dd80 r8:8027f5e8 r7:eb169e60 r6:842f0f80 r5:852a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a5fb0 to 0xeb1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84843cc0 INFO: task kworker/0:315:4634 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9acab000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:316:4636 blocked for more than 454 seconds. r4:852a1800 r4:00000000 r4:00000000 r5:00001000 r4:eaf0d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521278c r4:85212400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8521278c r4:8413de00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a1800 r8:8413de2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413de00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413de00 r8:8027f5e8 r7:eb169e60 r6:848aa000 r5:852a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a58000 INFO: task kworker/0:316:4636 is blocked on a mutex likely owned by task kworker/1:364:4416. r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:00001000 r4:eadff000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4640 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1b9d84 r8:00000002 r7:60000113 r6:eb1b9d8c r5:852a0c00 r4:852a0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a58440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85212f8c r4:85212c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85212f8c r4:8413df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a0c00 r8:8413df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413df00 r8:8027f5e8 r7:eb1b5e60 r6:848aa100 r5:852a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a58300 INFO: task kworker/0:318:4640 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9b68c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeae89fb0 to 0xeae89ff8) INFO: task kworker/1:442:4644 blocked for more than 454 seconds. r5:852a3c00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84831d00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc61000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85262b8c r4:85262800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85262b8c r4:848aa180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a3c00 r8:848aa1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848aa180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848aa180 r8:8027f5e8 r7:eb0e9e60 r6:848aa200 r5:852a3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84831800 INFO: task kworker/1:442:4644 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9b68c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Workqueue: events bpf_prog_free_deferred r5:852a4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84996dc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe35000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526238c r4:85262000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526238c r4:848aa280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a4800 r8:848aa2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000113 r4:80239bb0 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Not tainted 6.15.0-syzkaller #0 r4:852a5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r5:00001000 r4:eac71000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: 9d20: 9bacb000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4650 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4650 tgid:4650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eaec5d84 r8:00000002 r7:60000113 r6:eaec5d8c r5:852a6000 r4:852a6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a58840 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0715000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521238c r4:85212000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8521238c r4:8413df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a6000 r8:8413dfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413df80 r8:8027f5e8 r7:eb1b5e60 r6:848aa480 r5:852a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a58500 INFO: task kworker/0:319:4650 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:4652 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:852a6c00 r4:852a6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a55000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526338c r4:85263000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526338c r4:848aa500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a6c00 r8:848aa52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848aa500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a55040 INFO: task kworker/1:445:4652 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9c60e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ecf8f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeae89fb0 to 0xeae89ff8) task:kworker/1:446 state:D stack:0 pid:4653 tgid:4653 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r5:00001000 r4:e0927000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526378c r4:85263400 r7:ddde2d80 r6:83018200 r5:8526378c r4:848aa600 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 9c60e000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:4656 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb0c5d84 r8:00000002 r7:60000013 r6:eb0c5d8c r5:851e2400 r4:851e2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a55740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527c38c r4:8527c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527c38c r4:848aa700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e2400 r8:848aa72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848aa700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848aa700 r8:8027f5e8 r7:eac91e60 r6:848aa780 r5:851e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a55300 INFO: task kworker/1:447:4656 is blocked on a mutex likely owned by task kworker/1:364:4416. Workqueue: events bpf_prog_free_deferred 9d20: 9cb7d000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/1:448:4658 blocked for more than 454 seconds. r5:852a8000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eadd3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8527cb8c r4:848aa800 Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:4660 tgid:4660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb0f1d84 r8:00000002 r7:60000113 r6:eb0f1d8c r5:852a9800 r4:852a9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a55d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae15000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527c78c r4:8527c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527c78c r4:848aa900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a9800 r8:848aa92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848aa900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848aa900 r8:8027f5e8 r7:eb0e5e60 r6:848aa980 r5:852a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a554c0 INFO: task kworker/1:449:4660 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9cfb1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:eb1bdd84 r8:00000002 r7:60000013 r6:eb1bdd8c r5:852a8c00 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eae2d000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a55700 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r5:80000113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:4663 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1c1d84 r8:00000002 r7:60000113 r6:eb1c1d8c r5:852ab000 r4:852ab000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ab000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852249c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536d38c r4:8536d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536d38c r4:84735000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ab000 r8:8473502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84735000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84735000 r8:8027f5e8 r7:eb1b5e60 r6:848aab00 r5:852ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c1fb0 to 0xeb1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a587c0 INFO: task kworker/0:320:4663 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xeae89d28 to 0xeae89d70) 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:4666 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:4666 tgid:4666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:852abc00 r4:852abc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852abc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471f000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae43000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527d38c r4:8527d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527d38c r4:848aab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852abc00 r8:848aabac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848aab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848aab80 r8:8027f5e8 r7:eb1bde60 r6:848aac00 r5:852abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a55f40 INFO: task kworker/1:451:4666 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9d572000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eb1cdd84 r8:00000002 r7:60000113 r6:eb1cdd8c r5:852ad400 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb01b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521338c r4:85213000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:4670 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:4670 tgid:4670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1d1d84 r8:00000002 r7:60000013 r6:eb1d1d8c r5:852aa400 r4:852aa400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852aa400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471f6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae75000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527e38c r4:8527e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527e38c r4:848aad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852aa400 r8:848aad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848aad00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848aad00 r8:8027f5e8 r7:eb1c9e60 r6:848aad80 r5:852aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8471f080 INFO: task kworker/1:452:4670 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9daeb000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:4671 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:852ac800 r4:852ac800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ac800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471f240 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae55000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527df8c r4:8527dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527df8c r4:848aae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ac800 r8:848aae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848aae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848aae00 r8:8027f5e8 r7:eb1d1e60 r6:848aae80 r5:852ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d5fb0 to 0xeb1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8471f280 INFO: task kworker/1:453:4671 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9e030000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred r10:82918888 r9:eb1d9d84 r8:00000002 r7:60000013 r6:eb1d9d8c r5:851ed400 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471fb40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ef8c r4:8527ec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527ef8c r4:848aaf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ed400 r8:848aaf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848aaf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848aaf00 r8:8027f5e8 r7:eb1d1e60 r6:848aaf80 r5:851ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d9fb0 to 0xeb1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8471f4c0 INFO: task kworker/1:454:4673 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:455:4675 blocked for more than 454 seconds. r5:852aec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471f800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527e78c r4:8527e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527e78c r4:85220000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852aec00 r8:8522002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85220000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85220000 r8:8027f5e8 r7:eb1d9e60 r6:85220080 r5:852aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c5fb0 to 0xeb1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8471f880 INFO: task kworker/1:455:4675 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9e387000 ecf31000 00000001 80239b98 7f37f000 00000001 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:4678 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:852ae000 r4:852ae000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae9d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527db8c r4:8527d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527db8c r4:85220100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ae000 r8:8522012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85220100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85220100 r8:8027f5e8 r7:eb1d9e60 r6:85220180 r5:852ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8471f8c0 INFO: task kworker/1:456:4678 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:00001000 r4:ecf8f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847da040 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:4680 tgid:4680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1ddd84 r8:00000002 r7:60000113 r6:eb1ddd8c r5:852b0000 r4:852b0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471f9c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527eb8c r4:8527e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527eb8c r4:85220200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b0000 r8:8522022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85220200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85220200 r8:8027f5e8 r7:eb1d9e60 r6:85220280 r5:852b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1ddfb0 to 0xeb1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8471fa40 INFO: task kworker/1:457:4680 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9e7a6000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4682 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1e1d84 r8:00000002 r7:60000013 r6:eb1e1d8c r5:852b0c00 r4:852b0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84193480 r5:00001000 r4:eafdb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85263b8c r4:85263800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852b0c00 r8:8522032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:4683 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1e9d84 r8:00000002 r7:60000113 r6:eb1e9d8c r5:852b1800 r4:852b1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471fc00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527f78c r4:8527f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527f78c r4:85220400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b1800 r8:8522042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85220400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85220400 r8:8027f5e8 r7:eb1e1e60 r6:85220480 r5:852b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8471fdc0 INFO: task kworker/1:459:4683 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9ea03000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:4685 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1e5d84 r8:00000002 r7:60000113 r6:eb1e5d8c r5:852b2400 r4:852b2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a55e00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527fb8c r4:8527f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527fb8c r4:85220500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b2400 r8:8522052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85220500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85220500 r8:8027f5e8 r7:eb1e1e60 r6:85220580 r5:852b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8471f8c0 INFO: task kworker/1:460:4685 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9ed6b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4688 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4688 tgid:4688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1f1d84 r8:00000002 r7:60000113 r6:eb1f1d8c r5:852b4800 r4:852b4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84193040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:00001000 r4:eafbb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9f0e3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:4689 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1f5d84 r8:00000002 r7:60000013 r6:eb1f5d8c r5:852b3000 r4:852b3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84193940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85288f8c r4:85288c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85288f8c r4:85220700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b3000 r8:8522072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85220700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85220700 r8:8027f5e8 r7:eb1e1e60 r6:85220780 r5:852b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 9f895000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eafeb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:841935c0 INFO: task kworker/1:463:4692 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9f895000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:4693 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:4693 tgid:4693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb1fdd84 r8:00000002 r7:60000113 r6:eb1fdd8c r5:852b5400 r4:852b5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841935c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:eaffb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85288b8c r4:85288800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85288b8c r4:85220900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b5400 r8:8522092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85220900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85220900 r8:8027f5e8 r7:eb1f5e60 r6:85220980 r5:852b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84193600 INFO: task kworker/1:464:4693 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 9fcaa000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852b3c00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb03f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8528938c r4:85289000 r7:ddde2d80 r6:83018200 r5:8528938c r4:85220a00 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84828580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528a38c r4:8528a000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528a38c r4:85220b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b9800 r8:85220b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85220b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85220b00 r8:8027f5e8 r7:eb1ede60 r6:85220b80 r5:852b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb209fb0 to 0xeb209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84193b80 INFO: task kworker/1:466:4698 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a00e0000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:4700 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb20dd84 r8:00000002 r7:60000113 r6:eb20dd8c r5:852b8000 r4:852b8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471f8c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb061000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528978c r4:85289400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528978c r4:85220c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b8000 r8:85220c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85220c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85220c00 r8:8027f5e8 r7:eb209e60 r6:85220c80 r5:852b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb20dfb0 to 0xeb20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84193b40 INFO: task kworker/1:467:4700 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a046f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e09e3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eb215d84 r8:00000002 r7:60000013 r6:eb215d8c r5:852ba400 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb07f000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84193840 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:4705 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:4705 tgid:4705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb219d84 r8:00000002 r7:60000113 r6:eb219d8c r5:852b8c00 r4:852b8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb219e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84828100 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:00001000 r4:eb0a1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852b8c00 r8:85220eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb21dfb0 to 0xeb21dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:4709 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb135d84 r8:00000002 r7:60000013 r6:eb135d8c r5:852bc800 r4:852bc800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852bc800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84828e00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528b38c r4:8528b000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528b38c r4:84795080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bc800 r8:847950ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795080 r8:8027f5e8 r7:eb21de60 r6:84795100 r5:852bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84828600 INFO: task kworker/1:471:4709 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:472 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r5:00001000 r4:e007b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8528af8c r4:84795180 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/1:473:4714 blocked for more than 454 seconds. r4:852b6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e029d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528ab8c r4:8528a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528ab8c r4:84795280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b6c00 r8:847952ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795280 r8:8027f5e8 r7:eb135e60 r6:84795300 r5:852b6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84828c00 INFO: task kworker/1:473:4714 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a16bc000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:4716 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:4716 tgid:4716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918888 r9:eb221d84 r8:00000002 r7:60000113 r6:eb221d8c r5:852c8c00 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ead17000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0799000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528bb8c r4:8528b800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528bb8c r4:84795480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8000 r8:847954ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795480 r8:8027f5e8 r7:eb221e60 r6:84795500 r5:852c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84828780 INFO: task kworker/1:475:4718 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a1acc000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:4720 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb225d84 r8:00000002 r7:60000013 r6:eb225d8c r5:852c9800 r4:852c9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84758000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08cb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528bf8c r4:8528bc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528bf8c r4:84795580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c9800 r8:847955ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795580 r8:8027f5e8 r7:eb221e60 r6:84795600 r5:852c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847580c0 INFO: task kworker/1:476:4720 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a1ef5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 r5:00001000 r4:ecf8f000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:4722 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb22dd84 r8:00000002 r7:60000113 r6:eb22dd8c r5:852ca400 r4:852ca400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ca400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84758480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:00001000 r4:e093f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ff8c r4:8527fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527ff8c r4:84795680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84795680 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb22dfb0 to 0xeb22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84758280 INFO: task kworker/1:477:4722 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a1ef5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eb201d84 r8:00000002 r7:60000113 r6:eb201d8c r5:85243000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eac35000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85243000 r8:847351ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a58f80 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:478 state:D stack:0 pid:4726 tgid:4726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb229d84 r8:00000002 r7:60000113 r6:eb229d8c r5:85244800 r4:85244800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85244800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84758680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85244800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4a67000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529438c r4:85294000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529438c r4:84795780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85244800 r8:847957ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795780 r8:8027f5e8 r7:eb221e60 r6:84735280 r5:85244800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84758200 INFO: task kworker/1:478:4726 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a2374000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 r4:85246000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb205e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8af9000 r5:85294b8c r4:85294800 r4:84795800 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:480:4730 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:85245400 r4:85245400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85245400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84758640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85245400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab35000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529478c r4:85294400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529478c r4:84795880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85245400 r8:847958ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795880 r8:8027f5e8 r7:eb221e60 r6:84735380 r5:85245400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84758240 INFO: task kworker/1:480:4730 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a280c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84758940 INFO: task kworker/1:481:4733 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a2bdf000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4734 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:4734 tgid:4734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb235d84 r8:00000002 r7:60000113 r6:eb235d8c r5:85241800 r4:85241800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85241800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a3040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85241800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85213f8c r4:85213c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85241800 r8:847354ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:324:4734 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a2c8f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:85a3578c r4:85a35400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb2b3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8529db8c r4:84735580 Exception stack(0xeb241fb0 to 0xeb241ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:4738 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:85246c00 r4:85246c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85246c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84758bc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85246c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529538c r4:85295000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529538c r4:84795980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85246c00 r8:847959ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795980 r8:8027f5e8 r7:eb231e60 r6:84735680 r5:85246c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb249fb0 to 0xeb249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84758c00 INFO: task kworker/1:482:4738 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8529578c r4:85295400 r10:61c88647 r9:85240c00 r8:84795a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795a00 r8:8027f5e8 r7:eb231e60 r6:84735700 r5:85240c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84758c40 INFO: task kworker/1:483:4740 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a3462000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:852cc800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r5:00001000 r4:ead7b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852cc800 r8:84795aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795a80 r8:8027f5e8 r7:eb231e60 r6:84795b00 r5:852cc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb23dfb0 to 0xeb23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84758c40 INFO: task kworker/1:484:4742 is blocked on a mutex likely owned by task kworker/1:364:4416. Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:485 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ead95000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85295b8c r4:85295800 r4:84795b80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:485:4744 is blocked on a mutex likely owned by task kworker/1:364:4416. 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4746 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb259d84 r8:00000002 r7:60000113 r6:eb259d8c r5:852ce000 r4:852ce000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ce000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84193a00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529678c r4:85296400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529678c r4:84795c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ce000 r8:84795cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795c80 r8:8027f5e8 r7:eb231e60 r6:84795d00 r5:852ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb259fb0 to 0xeb259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84758dc0 INFO: task kworker/1:486:4746 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r4:eae89dc0 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:852cec00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eae5d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529638c r4:85296000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529638c r4:84795d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cec00 r8:84795dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795d80 r8:8027f5e8 r7:eb231e60 r6:84795e00 r5:852cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84758280 INFO: task kworker/1:487:4748 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a3c1a000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:488 state:D stack:0 pid:4751 tgid:4751 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r5:00001000 r4:eaeef000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84795e80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeae89d28 to 0xeae89d70) r4:00000000 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:852cbc00 r4:82918884 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaf3f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e2b8c r4:847e2800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847e2b8c r4:84795f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cbc00 r8:84795fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795f80 r8:8027f5e8 r7:eb231e60 r6:846f0000 r5:852cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb245fb0 to 0xeb245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84728100 INFO: task kworker/1:489:4752 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a4003000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:4755 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:852bd400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb269e08 r5:00001000 r4:eaf55000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:846f0080 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb17b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529c38c r4:8529c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529c38c r4:846f0180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d0000 r8:846f01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0180 r8:8027f5e8 r7:eb231e60 r6:846f0200 r5:852d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb26dfb0 to 0xeb26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84728380 INFO: task kworker/1:491:4756 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a43eb000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Exception stack(0xeae89fb0 to 0xeae89ff8) task:kworker/1:492 state:D stack:0 pid:4758 tgid:4758 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb117000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85297b8c r4:85297800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85297b8c r4:846f0280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d0c00 r8:846f02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0280 r8:8027f5e8 r7:eb26de60 r6:846f0300 r5:852d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb275fb0 to 0xeb275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84728900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb137000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529738c r4:85297000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529738c r4:846f0380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d1800 r8:846f03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0380 r8:8027f5e8 r7:eb26de60 r6:846f0400 r5:852d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb271fb0 to 0xeb271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84728500 INFO: task kworker/1:493:4760 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a4aab000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:4762 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:852d2400 r5:852d2400 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84728a80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85297f8c r4:85297c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85297f8c r4:846f0480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d2400 r8:846f04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0480 r8:8027f5e8 r7:eb26de60 r6:846f0500 r5:852d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84728980 INFO: task kworker/1:494:4762 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a4e1c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:4765 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:852d3000 r5:852d3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84728b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb163000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528b78c r4:8528b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528b78c r4:846f0580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d3000 r8:846f05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0580 r8:8027f5e8 r7:eb26de60 r6:846f0600 r5:852d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb27dfb0 to 0xeb27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84728c40 INFO: task kworker/1:495:4765 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a4e1c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:4767 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:4767 tgid:4767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb285d84 r8:00000002 r7:60000013 r6:eb285d8c r5:852d3c00 r4:852d3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a3440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536c78c r4:8536c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536c78c r4:846f0680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d3c00 r8:846f06ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0680 r8:8027f5e8 r7:eb26de60 r6:846f0700 r5:852d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb285fb0 to 0xeb285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84728dc0 INFO: task kworker/1:496:4767 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a52ac000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:4769 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb289d84 r8:00000002 r7:60000013 r6:eb289d8c r5:852d4800 r4:852d4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84727040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529cb8c r4:8529c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529cb8c r4:846f0780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d4800 r8:846f07ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0780 r8:8027f5e8 r7:eb285e60 r6:846f0800 r5:852d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84727100 INFO: task kworker/1:497:4769 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a5b73000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:846f0880 Exception stack(0xeb28dfb0 to 0xeb28dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:498:4771 is blocked on a mutex likely owned by task kworker/1:364:4416. r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:4772 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:4772 tgid:4772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb299d84 r8:00000002 r7:60000113 r6:eb299d8c r5:852d6000 r4:852d6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84727380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb29b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529cf8c r4:8529cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529cf8c r4:846f0980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d6000 r8:846f09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0980 r8:8027f5e8 r7:eb285e60 r6:846f0a00 r5:852d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb299fb0 to 0xeb299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84727480 INFO: task kworker/1:499:4772 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a636e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:4774 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:4774 tgid:4774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb281d84 r8:00000002 r7:60000013 r6:eb281d8c r5:852d6c00 r4:852d6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847275c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529d78c r4:8529d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529d78c r4:846f0b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d6c00 r8:846f0b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0b00 r8:8027f5e8 r7:eb285e60 r6:846f0b80 r5:852d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb281fb0 to 0xeb281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84727700 INFO: task kworker/1:500:4774 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a64b1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:4776 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:4776 tgid:4776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:852d8c00 r4:852d8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84727c80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529df8c r4:8529dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529df8c r4:846f0a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d8c00 r8:846f0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0a80 r8:8027f5e8 r7:eb285e60 r6:846f0c00 r5:852d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84727480 INFO: task kworker/1:501:4776 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a67c6000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4778 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4778 tgid:4778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:852d8000 r4:852d8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84743f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536c38c r4:8536c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536c38c r4:84735780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d8000 r8:847357ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84735780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84735780 r8:8027f5e8 r7:eb1c1e60 r6:846f0c80 r5:852d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847a3bc0 INFO: task kworker/0:326:4778 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a67c6000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:4780 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:4780 tgid:4780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb2cdd84 r8:00000002 r7:60000013 r6:eb2cdd8c r5:852d9800 r4:852d9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84727b80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529d38c r4:8529d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529d38c r4:846f0d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d9800 r8:846f0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0d00 r8:8027f5e8 r7:eb2b1e60 r6:846f0d80 r5:852d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2cdfb0 to 0xeb2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84727980 INFO: task kworker/1:502:4780 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a6d78000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 r4:852db000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r5:00001000 r4:eae53000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85318b8c r4:846f0e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852db000 r8:846f0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f0e00 r8:8027f5e8 r7:eb2b1e60 r6:846f0e80 r5:852db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84727c00 INFO: task kworker/1:503:4783 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a6d78000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:4784 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:4784 tgid:4784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb2a5d84 r8:00000002 r7:60000113 r6:eb2a5d8c r5:852dbc00 r4:852dbc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852dbc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84727e40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529e38c r4:8529e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529e38c r4:846f0f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dbc00 r8:846f0f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f0f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d60: 80230ad4 80239bb0 80000113 ffffffff [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918888 r9:eb2d5d84 r8:00000002 r7:60000113 r6:eb2d5d8c r5:852dd400 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e0141000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:852dd400 r8:847ad02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84727f00 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:4788 tgid:4788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb2d1d84 r8:00000002 r7:60000113 r6:eb2d1d8c r5:852de000 r4:852de000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852de000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8f000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852de000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529ef8c r4:8529ec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529ef8c r4:847ad100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852de000 r8:847ad12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ad100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ad100 r8:8027f5e8 r7:eb2bde60 r6:847ad180 r5:852de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84728c40 INFO: task kworker/1:506:4788 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847da040 r4:852dc800 r4:00000000 r5:00001000 r4:e090b000 r10:61c88647 r9:852dc800 r8:847ad22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: r4:82ac11e4 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 r4:852dec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead57000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529eb8c r4:8529e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529eb8c r4:847ad300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dec00 r8:847ad32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ad300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ad300 r8:8027f5e8 r7:eb2bde60 r6:847ad380 r5:852dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8f440 INFO: task kworker/1:508:4792 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a7899000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:4795 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:85308c00 r4:85308c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85308c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8f780 r5:00001000 r4:eadf9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) INFO: task kworker/1:509:4795 is blocked on a mutex likely owned by task kworker/1:364:4416. r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a7899000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eae1d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531838c r4:85318000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531838c r4:847ad500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85309800 r8:847ad52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ad500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ad500 r8:8027f5e8 r7:eb2bde60 r6:847ad580 r5:85309800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeae89fb0 to 0xeae89ff8) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eae35000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531878c r4:847ad600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530a400 r8:847ad62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ad600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ad600 r8:8027f5e8 r7:eb2bde60 r6:847ad680 r5:8530a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8fb40 INFO: task kworker/1:511:4800 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8ff00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8530bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85318f8c r4:85318c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85318f8c r4:847ad700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530bc00 r8:847ad72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ad700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ad700 r8:8027f5e8 r7:eb2bde60 r6:847ad780 r5:8530bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8fc80 INFO: task kworker/1:512:4801 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae95000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8531938c r4:847ad800 Exception stack(0xeae89d28 to 0xeae89d70) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) INFO: task kworker/1:514:4806 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb2f1d84 r8:00000002 r7:60000113 r6:eb2f1d8c r5:8530d400 r4:8530d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ed400 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8530d400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf8b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531a38c r4:8531a000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531a38c r4:847ad900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530d400 r8:847ad92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ad900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ad900 r8:8027f5e8 r7:eb2f5e60 r6:847ad980 r5:8530d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8ff80 INFO: task kworker/1:514:4806 is blocked on a mutex likely owned by task kworker/1:364:4416. Exception stack(0xeae89d28 to 0xeae89d70) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r5:00001000 r4:eaead000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8530e000 r8:847ada2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ada00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ada00 r8:8027f5e8 r7:eb2f1e60 r6:847ada80 r5:8530e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8530ec00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eaf6d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8531978c r4:847adb00 Exception stack(0xeb2fdfb0 to 0xeb2fdff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8530b000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ed680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8530b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531a78c r4:8531a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531a78c r4:847adc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530b000 r8:847adc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847adc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847adc00 r8:8027f5e8 r7:eb2f1e60 r6:847adc80 r5:8530b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb301fb0 to 0xeb301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ed240 INFO: task kworker/1:517:4811 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a8d89000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 task:kworker/1:518 state:D stack:0 pid:4813 tgid:4813 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r9:83018205 r8:852da400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 r5:00001000 r4:eaff3000 r7:ddde2d80 r6:83018200 r5:85319f8c r4:847add00 r10:00000000 r9:847add00 r8:8027f5e8 r7:eb301e60 r6:847add80 r5:852da400 r4:842ed540 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:4815 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb305d84 r8:00000002 r7:60000113 r6:eb305d8c r5:85370000 r4:85370000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85370000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ed740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85370000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531ab8c r4:8531a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531ab8c r4:847ade00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85370000 r8:847ade2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ade00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ade00 r8:8027f5e8 r7:eb309e60 r6:847ade80 r5:85370000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ed3c0 INFO: task kworker/1:519:4815 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84975400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r5:00001000 r4:eb0e1000 r7:ddde2d80 r6:83018200 r5:8532038c r4:847adf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 task:kworker/1:521 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb005000 r5:8531b38c r4:8531b000 r4:847adf80 Exception stack(0xeb31dfb0 to 0xeb31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ed780 INFO: task kworker/1:521:4819 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a96a4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:4821 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb325d84 r8:00000002 r7:60000113 r6:eb325d8c r5:84973000 r4:84973000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84973000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842eda80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84973000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531af8c r4:8531ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531af8c r4:847ae000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84973000 r8:847ae02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae000 r8:8027f5e8 r7:eb319e60 r6:84735900 r5:84973000 Exception stack(0xeb325fb0 to 0xeb325ff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:4823 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb32dd84 r8:00000002 r7:60000113 r6:eb32dd8c r5:84976c00 r4:84976c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84976c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb04f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531bb8c r4:8531b800 r7:ddde2d80 r6:83018200 r5:8531bb8c r4:847ae080 r4:00000001 r4:842edb80 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:4825 blocked for more than 456 seconds. Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb06f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8531bf8c r4:847ae100 Exception stack(0xeb335fb0 to 0xeb335ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: a9cd4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:4827 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:525 state:D stack:0 pid:4827 tgid:4827 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r5:84973c00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb0a9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84973c00 r8:847ae1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842eddc0 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:4830 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:526 state:D stack:0 pid:4830 tgid:4830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:84974800 r4:84974800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84974800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84974800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36c000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532078c r4:85320400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532078c r4:847ae200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84974800 r8:847ae22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae200 r8:8027f5e8 r7:eb319e60 r6:84735b00 r5:84974800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb349fb0 to 0xeb349ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:4831 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:4831 tgid:4831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:84970000 r4:84970000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84970000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352a00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84970000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08f3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85321f8c r4:85321c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85321f8c r4:847ae280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84970000 r8:847ae2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae280 r8:8027f5e8 r7:eb349e60 r6:84735b80 r5:84970000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/1:528:4833 blocked for more than 456 seconds. r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa91000 r5:8532138c r4:85321000 r10:61c88647 r9:84970c00 r8:847ae32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85352080 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4835 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4835 tgid:4835 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb339d84 r8:00000002 r7:60000113 r6:eb339d8c r5:84972400 r4:84972400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84972400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84972400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0797000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532238c r4:85322000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532238c r4:84735c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:4838 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb24dd84 r8:00000002 r7:60000013 r6:eb24dd8c r5:85308000 r4:85308000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85308000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85308000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532178c r4:85321400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532178c r4:847ae400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308000 r8:847ae42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae400 r8:8027f5e8 r7:eb34de60 r6:84735d80 r5:85308000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb24dfb0 to 0xeb24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85352040 INFO: task kworker/1:529:4838 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: aaf7b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:852bec00 r4:00000000 r5:00001000 r4:e0093000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852bec00 r8:847ae4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85352540 INFO: task kworker/1:530:4840 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ab07b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e022d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85320f8c r4:85320c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85320f8c r4:847ae500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fec00 r8:847ae52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae500 r8:8027f5e8 r7:eb34de60 r6:84735e80 r5:848fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85352680 INFO: task kworker/1:531:4842 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ab07b000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:82ac11e4 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:4844 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:532 state:D stack:0 pid:4844 tgid:4844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:84880000 r4:84880000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84880000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352d00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84880000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8afb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85322f8c r4:85322c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85322f8c r4:847ae580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84880000 r8:847ae5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae580 r8:8027f5e8 r7:eb34de60 r6:84735f00 r5:84880000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80000113 r4:80239bb0 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85322b8c r4:85322800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85322b8c r4:847ae600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84881800 r8:847ae62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae600 r8:8027f5e8 r7:eb2ade60 r6:84735f80 r5:84881800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Workqueue: events bpf_prog_free_deferred r5:84883000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e4a5d000 r7:ddde2d80 r6:83018200 r5:8532278c r4:847ae680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:4852 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:4852 tgid:4852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb391d84 r8:00000002 r7:60000113 r6:eb391d8c r5:84882400 r4:84882400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84882400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf63000 r5:8532578c r4:85325400 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 9fa0: 00000000 00000000 00000000 00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eabf9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532378c r4:85323400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532378c r4:847ae780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84884800 r8:847ae7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae780 r8:8027f5e8 r7:eb391e60 r6:8535a100 r5:84884800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85352e80 INFO: task kworker/1:536:4853 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r5:84883c00 r4:82918884 r5:00001000 r4:eaceb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85323b8c r4:847ae800 dfa0: 00000000 00000000 00000000 00000000 r5:80000113 r4:80239bb0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:4857 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:4857 tgid:4857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb3a5d84 r8:00000002 r7:60000113 r6:eb3a5d8c r5:84886c00 r4:84886c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84886c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791840 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84886c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead1b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85323f8c r4:85323c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85323f8c r4:847ae880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84886c00 r8:847ae8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae880 r8:8027f5e8 r7:eb391e60 r6:8535a200 r5:84886c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a5fb0 to 0xeb3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847433c0 INFO: task kworker/1:538:4857 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: acdcb000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead53000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8532338c r4:847ae900 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:4861 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb3b5d84 r8:00000002 r7:60000113 r6:eb3b5d8c r5:84880c00 r4:84880c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84880c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84880c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead77000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531b78c r4:8531b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531b78c r4:847ae980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84880c00 r8:847ae9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ae980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae980 r8:8027f5e8 r7:eb391e60 r6:8535a300 r5:84880c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b5fb0 to 0xeb3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85352240 INFO: task kworker/1:540:4861 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:4863 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:4863 tgid:4863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb3bdd84 r8:00000002 r7:60000113 r6:eb3bdd8c r5:85300c00 r4:85300c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85300c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eada1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532438c r4:85324000 r7:ddde2d80 r6:83018200 r5:8532438c r4:847aea00 Exception stack(0xeb3bdfb0 to 0xeb3bdff8) r4:8535f0c0 Call trace: 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eadc3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85300000 r8:847aeaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ad57e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:4867 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb2b9d84 r8:00000002 r7:60000013 r6:eb2b9d8c r5:85371800 r4:85371800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85371800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85371800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85324b8c r4:85324800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85324b8c r4:847aeb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85371800 r8:847aeb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847aeb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aeb00 r8:8027f5e8 r7:eb391e60 r6:847aeb80 r5:85371800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8535f240 INFO: task kworker/1:543:4867 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ad7a4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:4870 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb3cdd84 r8:00000002 r7:60000113 r6:eb3cdd8c r5:85372400 r4:85372400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85372400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85372400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf41000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532538c r4:85325000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532538c r4:847aec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85372400 r8:847aec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847aec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aec00 r8:8027f5e8 r7:eb391e60 r6:847aec80 r5:85372400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8535f840 INFO: task kworker/1:544:4870 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: adb00000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r5:80000113 r4:80239bb0 r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85373000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb139000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ae010000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:4873 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb311d84 r8:00000002 r7:60000013 r6:eb311d8c r5:85373c00 r4:85373c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85373c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85373c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85325b8c r4:85325800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85325b8c r4:847aee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85373c00 r8:847aee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847aee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aee00 r8:8027f5e8 r7:eb3d1e60 r6:847aee80 r5:85373c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8535f680 INFO: task kworker/1:546:4873 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad4 80239bb0 80000113 ffffffff [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:4875 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb3ddd84 r8:00000002 r7:60000113 r6:eb3ddd8c r5:85301800 r4:85301800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85301800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852244c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85301800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb483000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536cb8c r4:8536c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536cb8c r4:8535a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85301800 r8:8535a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8535a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535a480 r8:8027f5e8 r7:eb1c1e60 r6:8535a500 r5:85301800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85354c40 INFO: task kworker/0:328:4875 is blocked on a mutex likely owned by task kworker/1:364:4416. Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb401000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ae9e4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:4878 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb3e5d84 r8:00000002 r7:60000113 r6:eb3e5d8c r5:85303c00 r4:85303c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85303c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535fc80 r5:00001000 r4:eb15b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532638c r4:85326000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532638c r4:847aef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85303c00 r8:847aefac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847aef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aef80 r8:8027f5e8 r7:eb3e1e60 r6:8535a600 r5:85303c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8535fb00 INFO: task kworker/1:548:4878 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ae9e4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:4880 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:4880 tgid:4880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85304800 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb175000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532678c r4:85326400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532678c r4:84a7c000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85304800 r8:84a7c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:00001000 r4:ecf8f000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:4882 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:4882 tgid:4882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb3d5d84 r8:00000002 r7:60000113 r6:eb3d5d8c r5:85375400 r4:85375400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85375400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ff00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85375400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85326b8c r4:85326800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85326b8c r4:84a7c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85375400 r8:84a7c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7c080 r8:8027f5e8 r7:eb3e1e60 r6:84a7c100 r5:85375400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8535fac0 INFO: task kworker/1:550:4882 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: aefd4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:4884 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:4884 tgid:4884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb3edd84 r8:00000002 r7:60000013 r6:eb3edd8c r5:85374800 r4:85374800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85374800 r4:82918884 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb265000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85326f8c r4:84a7c180 Exception stack(0xeb3edfb0 to 0xeb3edff8) r4:8535f900 Call trace: 9d20: af49f000 ecf31000 00000001 80239b98 7f37f000 00000001 r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:552 state:D stack:0 pid:4887 tgid:4887 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85324f8c r4:84a7c280 Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) r4:842ee180 Call trace: 9d20: af49f000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:00000000 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 INFO: task kworker/1:553:4889 blocked for more than 456 seconds. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb3f7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: af97f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:4891 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb405d84 r8:00000002 r7:60000013 r6:eb405d8c r5:85370c00 r4:85370c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85370c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ee9c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85370c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb431000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85330b8c r4:85330800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85330b8c r4:84a7c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85370c00 r8:84a7c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7c480 r8:8027f5e8 r7:eb3e1e60 r6:84a7c500 r5:85370c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ee400 INFO: task kworker/1:554:4891 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b0234000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:4892 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:85378000 r4:85378000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85378000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ee680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85378000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb415000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85327f8c r4:85327c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85327f8c r4:84a7c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85378000 r8:84a7c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7c580 r8:8027f5e8 r7:eb405e60 r6:84a7c600 r5:85378000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb411fb0 to 0xeb411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ee7c0 INFO: task kworker/1:555:4892 is blocked on a mutex likely owned by task kworker/1:364:4416. Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:4894 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb421d84 r8:00000002 r7:60000013 r6:eb421d8c r5:85378c00 r4:85378c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85378c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ee800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85378c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb425000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533038c r4:85330000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533038c r4:84a7c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85378c00 r8:84a7c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7c680 r8:8027f5e8 r7:eb405e60 r6:84a7c700 r5:85378c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb421fb0 to 0xeb421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ee940 INFO: task kworker/1:556:4894 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b09ec000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4897 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb42dd84 r8:00000002 r7:60000113 r6:eb42dd8c r5:85379800 r4:85379800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85379800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r5:00001000 r4:eb455000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85379800 r8:84a7c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8537a400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb43d000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8537a400 r8:84a7c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842eec40 Workqueue: events bpf_prog_free_deferred 9d20: b1204000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:4900 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb449d84 r8:00000002 r7:60000113 r6:eb449d8c r5:8537bc00 r4:8537bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8537bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842eec40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8537bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb445000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533138c r4:85331000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533138c r4:84a7c980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8537bc00 r8:84a7c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7c980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7c980 r8:8027f5e8 r7:eb42de60 r6:84a7ca00 r5:8537bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb449fb0 to 0xeb449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:560:4903 blocked for more than 456 seconds. r5:8537c800 r4:82918884 r4:00000000 r4:00000000 r5:00001000 r4:eb47b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85331f8c r4:84a7ca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8537c800 r8:84a7caac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ca80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7ca80 r8:8027f5e8 r7:eb42de60 r6:84a7cb00 r5:8537c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842eeac0 INFO: task kworker/1:560:4903 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b1875000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4904 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb451d84 r8:00000002 r7:60000013 r6:eb451d8c r5:8537d400 r4:8537d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8537d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb463000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8537d400 r8:84a7cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: b1875000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:eae89dc0 r5:00001000 r4:ecf8f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:4908 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb46dd84 r8:00000002 r7:60000013 r6:eb46dd8c r5:8537ec00 r4:8537ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8537ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9040 r5:00001000 r4:eb46f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85331b8c r4:84a7cc80 Exception stack(0xeb46dfb0 to 0xeb46dff8) r4:853a9240 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb52f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8533838c r4:84a7cd80 r10:00000000 r9:84a7cd80 r8:8027f5e8 r7:eb439e60 r6:84a7ce00 r5:8537b000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:4911 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:85306000 r4:85306000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85306000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a81040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85306000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0661000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e3f8c r4:847e3c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e3f8c r4:8535a700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85306000 r8:8535a72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8535a700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535a700 r8:8027f5e8 r7:eb1c1e60 r6:8535a780 r5:85306000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85224480 INFO: task kworker/0:329:4911 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b18a2000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb48f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8533278c r4:84a7ce80 Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a9440 INFO: task kworker/1:564:4912 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b1e7d000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:4915 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb4add84 r8:00000002 r7:60000013 r6:eb4add8c r5:85303000 r4:85303000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb49f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533238c r4:85332000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a7cf00 r8:8027f5e8 r7:eb479e60 r6:8535a880 r5:85303000 r4:853a9400 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08 r5:00001000 r4:eb4b3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85332b8c r4:84a7cf80 Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:4918 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb48dd84 r8:00000002 r7:60000113 r6:eb48dd8c r5:84298000 r4:84298000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84298000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84298000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85332f8c r4:85332c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85332f8c r4:853ac000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84298000 r8:853ac02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac000 r8:8027f5e8 r7:eb479e60 r6:8535a980 r5:84298000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb48dfb0 to 0xeb48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a98c0 INFO: task kworker/1:567:4918 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b2877000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:4920 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb4c5d84 r8:00000002 r7:60000113 r6:eb4c5d8c r5:84298c00 r4:84298c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84298c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84298c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536e38c r4:8536e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536e38c r4:8535aa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84298c00 r8:8535aa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8535aa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535aa00 r8:8027f5e8 r7:eb45de60 r6:8535aa80 r5:84298c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c5fb0 to 0xeb4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85224980 INFO: task kworker/0:330:4920 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80000113 r4:80239bb0 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:568:4922 blocked for more than 457 seconds. Call trace: r4:8429a400 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9ac0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8429a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533378c r4:85333400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533378c r4:853ac080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8429a400 r8:853ac0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac080 r8:8027f5e8 r7:eb479e60 r6:8535ab00 r5:8429a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d9fb0 to 0xeb4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a9a40 INFO: task kworker/1:568:4922 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b30a5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:4924 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb4f9d84 r8:00000002 r7:60000113 r6:eb4f9d8c r5:84299800 r4:84299800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84299800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9c00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84299800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533338c r4:85333000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533338c r4:853ac100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84299800 r8:853ac12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac100 r8:8027f5e8 r7:eb479e60 r6:8535ab80 r5:84299800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a9a80 INFO: task kworker/1:569:4924 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b30a5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4926 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4926 tgid:4926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb505d84 r8:00000002 r7:60000113 r6:eb505d8c r5:8429b000 r4:8429b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8429b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8429b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb507000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85333f8c r4:85333c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85333f8c r4:853ac180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8429b000 r8:853ac1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac180 r8:8027f5e8 r7:eb479e60 r6:8535ac00 r5:8429b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb505fb0 to 0xeb505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a9a80 INFO: task kworker/1:570:4926 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:571:4929 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:571 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb52dd84 r8:00000002 r7:60000013 r6:eb52dd8c r5:8429bc00 r4:8429bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8429bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9e80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8429bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb513000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85333b8c r4:85333800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85333b8c r4:853ac200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8429bc00 r8:853ac22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac200 r8:8027f5e8 r7:eb479e60 r6:8535ac80 r5:8429bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a9d00 INFO: task kworker/1:571:4929 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b39f2000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: r4:8429c800 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba7c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8429c800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead35000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85339f8c r4:85339c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85339f8c r4:853ac280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8429c800 r8:853ac2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac280 r8:8027f5e8 r7:eb479e60 r6:8535ad00 r5:8429c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb545fb0 to 0xeb545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85354140 INFO: task kworker/1:572:4931 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b39f2000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:4933 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb315d84 r8:00000002 r7:60000113 r6:eb315d8c r5:85258000 r4:85258000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85258000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85354f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85258000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85338b8c r4:85338800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85338b8c r4:853ac300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85258000 r8:853ac32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac300 r8:8027f5e8 r7:eb545e60 r6:8535ad80 r5:85258000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a9f80 INFO: task kworker/1:573:4933 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b40f1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Exception stack(0xeae89fb0 to 0xeae89ff8) r4:847da040 task:kworker/1:574 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb54dd84 r8:00000002 r7:60000013 r6:eb54dd8c r5:85259800 r4:85259800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85259800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85259800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85338f8c r4:85338c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85338f8c r4:853ac380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85259800 r8:853ac3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac380 r8:8027f5e8 r7:eb545e60 r6:8535ae00 r5:85259800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ba140 INFO: task kworker/1:574:4935 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b448b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852e0c00 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8533878c r4:85338400 r4:853ac400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b49cf000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8533978c r4:853ac500 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:852e3000 r4:852e3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533938c r4:85339000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533938c r4:853ac600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e3000 r8:853ac62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac600 r8:8027f5e8 r7:eb545e60 r6:853ac680 r5:852e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ba540 INFO: task kworker/1:577:4941 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b51e8000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:4943 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb559d84 r8:00000002 r7:60000013 r6:eb559d8c r5:852e3c00 r4:852e3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85339b8c r4:85339800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85339b8c r4:853ac700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e3c00 r8:853ac72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac700 r8:8027f5e8 r7:eb545e60 r6:853ac780 r5:852e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ba240 INFO: task kworker/1:578:4943 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b583d000 ecf31000 00000001 80239b98 7f37f000 00000001 9d60: 80230ad4 80239bb0 80000113 ffffffff [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:4945 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb49dd84 r8:00000002 r7:60000013 r6:eb49dd8c r5:852e5400 r4:852e5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853baa40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae01000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533a78c r4:8533a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533a78c r4:853ac800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e5400 r8:853ac82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac800 r8:8027f5e8 r7:eb545e60 r6:853ac880 r5:852e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb49dfb0 to 0xeb49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ba700 INFO: task kworker/1:579:4945 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b583d000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:4946 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:4946 tgid:4946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:8525b000 r4:8525b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8525b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bad80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8525b000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533a38c r4:8533a000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533a38c r4:853ac900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525b000 r8:853ac92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac900 r8:8027f5e8 r7:eb49de60 r6:8535ae80 r5:8525b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ba700 INFO: task kworker/1:580:4946 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b5bcf000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85258c00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bad40 r5:00001000 r4:eaf8d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533ab8c r4:8533a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533ab8c r4:853ac980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85258c00 r8:853ac9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ac980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ac980 r8:8027f5e8 r7:eb561e60 r6:8535af00 r5:85258c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bab00 INFO: task kworker/1:581:4948 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b5bcf000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:331:4952 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb565d84 r8:00000002 r7:60000113 r6:eb565d8c r5:8525bc00 r4:8525bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8525bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c08c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8525bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536eb8c r4:8536e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536eb8c r4:8535af80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525bc00 r8:8535afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8535af80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535af80 r8:8027f5e8 r7:eb45de60 r6:853c6000 r5:8525bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb565fb0 to 0xeb565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c06c0 INFO: task kworker/0:331:4952 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b5d64000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:8525d400 r4:8525d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8525d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853baf40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8525d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaecd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533af8c r4:8533ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533af8c r4:853aca00 r10:61c88647 r9:8525d400 r8:853aca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r5:00001000 r4:eb035000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:853c6100 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85224980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8525c800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafcb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533b78c r4:8533b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533b78c r4:853aca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525c800 r8:853acaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853aca80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853aca80 r8:8027f5e8 r7:eb55de60 r6:853c6200 r5:8525c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb57dfb0 to 0xeb57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bad40 INFO: task kworker/1:583:4957 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b62cf000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:584:4959 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:584 state:D stack:0 pid:4959 tgid:4959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:8525ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r5:00001000 r4:eb31f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8533c38c r4:853acb00 Exception stack(0xeb585fb0 to 0xeb585ff8) r4:85224980 Call trace: 9d20: b695e000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:4961 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:4961 tgid:4961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb58dd84 r8:00000002 r7:60000113 r6:eb58dd8c r5:8429e000 r4:8429e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8429e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8429e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafed000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533b38c r4:8533b000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533b38c r4:853acb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8429e000 r8:853acbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853acb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853acb80 r8:8027f5e8 r7:eb585e60 r6:853c6300 r5:8429e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85224040 INFO: task kworker/1:585:4961 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d20: b695e000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8525a400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:00001000 r4:eb00d000 r5:8533bb8c r4:8533b800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:853bac00 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8429d400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8429d400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb069000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533bf8c r4:8533bc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533bf8c r4:853acc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8429d400 r8:853accac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853acc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853acc80 r8:8027f5e8 r7:eb585e60 r6:853c6400 r5:8429d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c4000 INFO: task kworker/1:587:4965 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b6f03000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:84988c00 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb351000 r10:61c88647 r9:84988c00 r8:853c64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6480 r8:8027f5e8 r7:eb45de60 r6:853c6500 r5:84988c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a1fb0 to 0xeb5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c0a00 INFO: task kworker/0:333:4967 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b6f03000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/1:588:4969 blocked for more than 457 seconds. r4:84988000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r5:00001000 r4:eb0b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85327b8c r4:85327800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85327b8c r4:853acd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84988000 r8:853acd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853acd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853acd00 r8:8027f5e8 r7:eb585e60 r6:853c6580 r5:84988000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c42c0 INFO: task kworker/1:588:4969 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b7667000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) INFO: task kworker/1:589:4971 blocked for more than 457 seconds. r5:84989800 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb541000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:4973 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:4973 tgid:4973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:8498a400 r4:8498a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8498a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c45c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8498a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb32f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533cb8c r4:8533c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533cb8c r4:853ace00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498a400 r8:853ace2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ace00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ace00 r8:8027f5e8 r7:eb5b1e60 r6:853c6680 r5:8498a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c42c0 INFO: task kworker/1:590:4973 is blocked on a mutex likely owned by task kworker/1:364:4416. Call trace: 9d20: b7a1c000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/1:591:4975 blocked for more than 457 seconds. r4:852e6c00 r4:00000000 r4:00000000 r5:00001000 r4:eb370000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8533c78c r4:853ace80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa9d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8533e38c r4:853acf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e4800 r8:853acfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853acf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853acf80 r8:8027f5e8 r7:eb5b1e60 r6:853cf000 r5:852e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c4800 INFO: task kworker/1:592:4978 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b7dc4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:4980 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:593 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb5c9d84 r8:00000002 r7:60000013 r6:eb5c9d8c r5:852e6000 r4:852e6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4c40 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:853cf080 9fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:4982 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:4982 tgid:4982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:8498bc00 r4:8498bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8498bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r5:00001000 r4:eb5e1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8498bc00 r8:853c672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8413c340 INFO: task kworker/0:334:4982 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b85c1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r4:847da040 r10:82918888 r9:eb5d9d84 r8:00000002 r7:60000113 r6:eb5d9d8c r5:8498c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4e00 r5:00001000 r4:eb5d5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533db8c r4:8533d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533db8c r4:853cf180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498c800 r8:853cf1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cf180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf180 r8:8027f5e8 r7:eb5bde60 r6:853c6800 r5:8498c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c4d80 INFO: task kworker/1:594:4983 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeae89d28 to 0xeae89d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb605000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:8498e000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413c8c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8498e000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536f38c r4:8536f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536f38c r4:853c6900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498e000 r8:853c692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6900 r8:8027f5e8 r7:eb45de60 r6:853c6980 r5:8498e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5edfb0 to 0xeb5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413c780 INFO: task kworker/0:335:4987 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b8ce6000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:8498ec00 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb5f9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:337:4992 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:8498b000 r4:8498b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8498b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8498b000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0883000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a478c r4:853a4400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a478c r4:853c6b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498b000 r8:853c6b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6b00 r8:8027f5e8 r7:eb45de60 r6:853c6b80 r5:8498b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413c500 INFO: task kworker/0:337:4992 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b90e2000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb611000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8533df8c r4:8533dc00 r4:853cf280 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:4995 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb625d84 r8:00000002 r7:60000013 r6:eb625d8c r5:853d0c00 r4:853d0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb61d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Call trace: 9d20: b960f000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r5:00001000 r4:eb62d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8533eb8c r4:853cf380 Exception stack(0xeb635fb0 to 0xeb635ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb38dd84 r8:00000002 r7:60000113 r6:eb38dd8c r5:853d1800 r4:853d1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb38de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c5480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533f38c r4:8533f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533f38c r4:853cf400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d1800 r8:853cf42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cf400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf400 r8:8027f5e8 r7:eb5bde60 r6:853c6d80 r5:853d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb38dfb0 to 0xeb38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c5100 INFO: task kworker/1:599:4999 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b9a33000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 r5:853d2400 r4:82918884 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e01c5000 r5:8533ef8c r4:8533ec00 Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/1:601:5004 blocked for more than 457 seconds. Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:853d3000 r4:853d3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c5640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533f78c r4:8533f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533f78c r4:853cf500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d3000 r8:853cf52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cf500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf500 r8:8027f5e8 r7:eb3b9e60 r6:853c6e80 r5:853d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c5500 INFO: task kworker/1:601:5004 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: b9e57000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8aa5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534478c r4:853cf580 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: ba2bf000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:5007 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb499d84 r8:00000002 r7:60000113 r6:eb499d8c r5:853d4800 r4:853d4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c58c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0905000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533ff8c r4:8533fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533ff8c r4:853cf600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d4800 r8:853cf62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cf600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf600 r8:8027f5e8 r7:eb475e60 r6:853c6f80 r5:853d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb499fb0 to 0xeb499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c5680 INFO: task kworker/1:603:5007 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d20: ba2bf000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:00000000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eb4c1d84 r8:00000002 r7:60000113 r6:eb4c1d8c r5:853d5400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c5980 r5:00001000 r4:e09f7000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d20: ba90f000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:82ac11e4 r4:eae89dc0 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:5011 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb4ddd84 r8:00000002 r7:60000013 r6:eb4ddd8c r5:853d6000 r4:853d6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd100 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ed000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534638c r4:85346000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534638c r4:853cf700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d6000 r8:853cf72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cf700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf700 r8:8027f5e8 r7:eb475e60 r6:85222080 r5:853d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c59c0 INFO: task kworker/1:605:5011 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ba90f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eabfd000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d20: baf98000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:607:5015 blocked for more than 458 seconds. [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eacff000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534538c r4:853cf800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r10:82918888 r9:eb63dd84 r8:00000002 r7:60000113 r6:eb63dd8c r5:84891800 r5:00001000 r4:ead41000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb63dfb0 to 0xeb63dff8) Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:84893000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead83000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85345b8c r4:85345800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85345b8c r4:853cf900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84893000 r8:853cf92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cf900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf900 r8:8027f5e8 r7:eb4dde60 r6:85222280 r5:84893000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb645fb0 to 0xeb645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413c200 INFO: task kworker/1:609:5019 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: bb53e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:5021 blocked for more than 458 seconds. task:kworker/1:610 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eadab000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85344b8c r4:85344800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85344b8c r4:853cf980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84893c00 r8:853cf9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cf980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf980 r8:8027f5e8 r7:eb4dde60 r6:85222300 r5:84893c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb64dfb0 to 0xeb64dff8) dfa0: 00000000 00000000 00000000 00000000 r4:853c5e80 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:ecf8f000 r4:00000001 INFO: task kworker/1:611:5023 blocked for more than 458 seconds. r4:00000000 r5:00001000 r4:eaedf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb655fb0 to 0xeb655ff8) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84895400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534678c r4:85346400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534678c r4:853cfa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84895400 r8:853cfaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cfa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cfa80 r8:8027f5e8 r7:eb4dde60 r6:85222400 r5:84895400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413cd80 INFO: task kworker/1:612:5025 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: bbe30000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:eae89dc0 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:847da040 r10:82918888 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:84890000 r5:00001000 r4:eb121000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850dd000 r4:00000000 r4:82ac11e4 r4:00000000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:614:5029 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:84896c00 r4:84896c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84896c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84896c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85346b8c r4:85346800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85346b8c r4:853cfb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84896c00 r8:853cfbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cfb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cfb80 r8:8027f5e8 r7:eb665e60 r6:85222500 r5:84896c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80000113 r4:80239bb0 r5:00001000 r4:ecf8f000 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Call trace: [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb385000 r4:853cfc00 r4:850dd140 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eae89dc0 r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Call trace: [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb193000 r10:61c88647 r9:852e0000 r8:853cfcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850dd140 INFO: task kworker/1:616:5033 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: bc87e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:617:5035 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:617 state:D stack:0 pid:5035 tgid:5035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb675d84 r8:00000002 r7:60000113 r6:eb675d8c r5:852e1800 r4:852e1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd740 r5:00001000 r4:eb263000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8534778c r4:853cfd80 5fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:618:5037 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:618 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:85306c00 r4:85306c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85306c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85306c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85347f8c r4:85347c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85347f8c r4:853cfe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85306c00 r8:853cfeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cfe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cfe80 r8:8027f5e8 r7:eb671e60 r6:853cff00 r5:85306c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850dd7c0 INFO: task kworker/1:618:5037 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: bcebc000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08 r9:83018205 r8:8537e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:00001000 r4:eafcd000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850dd880 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:5041 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb681d84 r8:00000002 r7:60000013 r6:eb681d8c r5:852e8000 r4:852e8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ddc80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540c38c r4:8540c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540c38c r4:84aa7080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e8000 r8:84aa70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:852e8c00 r4:82918884 r5:00001000 r4:eb3c5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540cb8c r4:8540c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540cb8c r4:84aa7180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e8c00 r8:84aa71ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa7180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa7180 r8:8027f5e8 r7:eb67de60 r6:84aa7200 r5:852e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb685fb0 to 0xeb685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850dd880 INFO: task kworker/1:621:5043 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: bdc7e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:5045 blocked for more than 458 seconds. task:kworker/1:622 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb407000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8540c78c r4:84aa7280 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb619d84 r8:00000002 r7:60000113 r6:eb619d8c r5:852eb000 r4:852eb000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852eb000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8a000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb419000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540d38c r4:8540d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540d38c r4:84aa7380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852eb000 r8:84aa73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa7380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa7380 r8:8027f5e8 r7:eb67de60 r6:84aa7400 r5:852eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ddf80 INFO: task kworker/1:623:5047 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:5049 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:5049 tgid:5049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb691d84 r8:00000002 r7:60000013 r6:eb691d8c r5:852ea400 r4:852ea400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ea400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8a640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8aed000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540cf8c r4:8540cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540cf8c r4:84aa7480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ea400 r8:84aa74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa7480 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:84a8a180 INFO: task kworker/1:624:5049 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: bdf9d000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:5053 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918888 r9:eb68dd84 r8:00000002 r7:60000113 r6:eb68dd8c r5:853e8000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead59000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e338c r4:85222600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8000 r8:8522262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85222600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222600 r8:8027f5e8 r7:eb5f5e60 r6:85222680 r5:853e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb68dfb0 to 0xeb68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a81080 INFO: task kworker/0:338:5053 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: be443000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:5054 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:625 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb6a1d84 r8:00000002 r7:60000013 r6:eb6a1d8c r5:853ea400 r4:853ea400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853ea400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a81140 r5:00001000 r4:eae13000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8540db8c r4:84aa7580 r4:84aa7580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa7580 r8:8027f5e8 r7:eb67de60 r6:85222700 r5:853ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8a600 INFO: task kworker/1:625:5054 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: be443000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/0:339:5058 blocked for more than 458 seconds. r4:852ee000 r4:00000000 r4:00000000 r5:00001000 r4:eae45000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e378c r4:847e3400 r7:dddced80 r6:83018000 r5:847e378c r4:85222780 Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: be931000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:852ed400 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8aa80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae85000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540e38c r4:8540e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540e38c r4:84aa7680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ed400 r8:84aa76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa7680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa7680 r8:8027f5e8 r7:eb67de60 r6:84aa7700 r5:852ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8ab80 INFO: task kworker/1:626:5060 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: bedff000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb353000 r5:847e3b8c r4:847e3800 r10:61c88647 r9:852ebc00 r8:8522282c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:852eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r5:00001000 r4:eaebb000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540e78c r4:84aa7800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852eec00 r8:84aa782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa7800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa7800 r8:8027f5e8 r7:eb67de60 r6:84aa7880 r5:852eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8ab40 INFO: task kworker/1:627:5063 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: bf115000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:5065 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:5065 tgid:5065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r9:83018205 r8:852ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 r5:00001000 r4:eaf81000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:629 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb0d5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8540fb8c r4:84aa7a00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d20: bf605000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:5069 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:85450c00 r4:85450c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85450c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ddf40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85450c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaffd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540f38c r4:8540f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540f38c r4:84aa7b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85450c00 r8:84aa7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa7b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa7b00 r8:8027f5e8 r7:eb69de60 r6:84aa7b80 r5:85450c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d20: bfa5f000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:631:5072 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:631 state:D stack:0 pid:5072 tgid:5072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb6b9d84 r8:00000002 r7:60000013 r6:eb6b9d8c r5:85451800 r4:85451800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85451800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa5040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85451800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb033000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540ef8c r4:8540ec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540ef8c r4:84aa7c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85451800 r8:84aa7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb081000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8540f78c r4:84aa7d00 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84aa52c0 INFO: task kworker/1:632:5074 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c0071000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:5076 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:5076 tgid:5076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb433000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8540ff8c r4:84aa7e00 Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85454800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb329000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533fb8c r4:8533f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533fb8c r4:84aa7f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85454800 r8:84aa7f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa7f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa7f00 r8:8027f5e8 r7:eb6c5e60 r6:84aa7f80 r5:85454800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84aa5440 INFO: task kworker/1:634:5077 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c04b0000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:635:5079 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85455400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 r5:00001000 r4:eb51d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541a78c r4:8541a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541a78c r4:848a7000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85455400 r8:848a702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7000 r8:8027f5e8 r7:eb6c5e60 r6:848a7080 r5:85455400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6cdfb0 to 0xeb6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84aa5440 INFO: task kworker/1:635:5079 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:341 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb376000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eae89dc0 r4:00000000 r5:00001000 r4:ecf8f000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:5083 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb6d1d84 r8:00000002 r7:60000113 r6:eb6d1d8c r5:853eb000 r4:853eb000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853eb000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536ff8c r4:8536fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536ff8c r4:85222980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eb000 r8:852229ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85222980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222980 r8:8027f5e8 r7:eb5f5e60 r6:85222a00 r5:853eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d1fb0 to 0xeb6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a81bc0 INFO: task kworker/0:342:5083 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c0e57000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb441000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c0e57000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:637:5087 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:637 state:D stack:0 pid:5087 tgid:5087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb6e5d84 r8:00000002 r7:60000013 r6:eb6e5d8c r5:853ed400 r4:853ed400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853ed400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa5c40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb459000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85418b8c r4:85418800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853ed400 r8:848a71ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: c125c000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eb6edd84 r8:00000002 r7:60000113 r6:eb6edd8c r5:853eec00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa5d00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541838c r4:85418000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541838c r4:848a7200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eec00 r8:848a722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7200 r8:8027f5e8 r7:eb6cde60 r6:85222b80 r5:853eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84aa5c00 INFO: task kworker/1:638:5089 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c125c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:5091 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:639 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb6f5d84 r8:00000002 r7:60000013 r6:eb6f5d8c r5:853e8c00 r4:853e8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa5e40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb491000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85418f8c r4:85418c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85418f8c r4:848a7280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8c00 r8:848a72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7280 r8:8027f5e8 r7:eb6cde60 r6:85222c00 r5:853e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f5fb0 to 0xeb6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84aa5c00 INFO: task kworker/1:639:5091 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c165c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:640:5094 blocked for more than 458 seconds. task:kworker/1:640 state:D stack:0 pid:5094 tgid:5094 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:853e9800 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa5f40 r5:00001000 r4:eb4b9000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8541938c r4:848a7300 r4:848a7300 Exception stack(0xeb701fb0 to 0xeb701ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84aa5a40 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d20: c165c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:5095 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:5095 tgid:5095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb6d5d84 r8:00000002 r7:60000113 r6:eb6d5d8c r5:85456000 r4:85456000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85456000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a81440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85456000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85419b8c r4:85419800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85419b8c r4:848a7380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85456000 r8:848a73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7380 r8:8027f5e8 r7:eb6cde60 r6:848a7400 r5:85456000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a81f00 INFO: task kworker/1:641:5095 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c1bde000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ed000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85419f8c r4:85419c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85419f8c r4:848a7480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85456c00 r8:848a74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7480 r8:8027f5e8 r7:eb6cde60 r6:848a7500 r5:85456c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6fdfb0 to 0xeb6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8af80 INFO: task kworker/1:642:5097 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c1bde000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:643:5100 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:643 state:D stack:0 pid:5100 tgid:5100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb705d84 r8:00000002 r7:60000013 r6:eb705d8c r5:85453c00 r4:85453c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85453c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85453c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb501000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541978c r4:85419400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541978c r4:848a7580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85453c00 r8:848a75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7580 r8:8027f5e8 r7:eb6cde60 r6:848a7600 r5:85453c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb705fb0 to 0xeb705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a8300 INFO: task kworker/1:643:5100 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c1fef000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb553000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8541a38c r4:848a7680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:644:5102 is blocked on a mutex likely owned by task kworker/1:364:4416. Call trace: r4:00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:5103 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb6d9d84 r8:00000002 r7:60000113 r6:eb6d9d8c r5:85458c00 r4:85458c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85458c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85458c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541ab8c r4:8541a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ab8c r4:848a7780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85458c00 r8:848a77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7780 r8:8027f5e8 r7:eb709e60 r6:848a7800 r5:85458c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a8180 INFO: task kworker/1:645:5103 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c2833000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:5106 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:5106 tgid:5106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb711d84 r8:00000002 r7:60000013 r6:eb711d8c r5:85459800 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb57f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85459800 r8:848a78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7880 r8:8027f5e8 r7:eb709e60 r6:848a7900 r5:85459800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb711fb0 to 0xeb711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a8580 INFO: task kworker/1:646:5106 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c2833000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Exception stack(0xeae89fb0 to 0xeae89ff8) Call trace: [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb58f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541af8c r4:8541ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541af8c r4:848a7980 r10:61c88647 r9:8545b000 r8:848a79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb715fb0 to 0xeb715ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c2833000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:5110 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:5110 tgid:5110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb71dd84 r8:00000002 r7:60000013 r6:eb71dd8c r5:8545c800 r4:8545c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8545c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a89c0 r5:00001000 r4:eb5bf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8545c800 r8:848a7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xeae89d28 to 0xeae89d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb5a3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541bb8c r4:848a7c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545bc00 r8:848a7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7c00 r8:8027f5e8 r7:eb71de60 r6:848a7c80 r5:8545bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a8b00 INFO: task kworker/1:649:5112 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c3042000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:5114 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:5114 tgid:5114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918888 r9:eb725d84 r8:00000002 r7:60000013 r6:eb725d8c r5:8545e000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb5df000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8542038c r4:848a7b80 Exception stack(0xeb725fb0 to 0xeb725ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb5cd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5fd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85420f8c r4:85420c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85420f8c r4:848a7e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85460000 r8:848a7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7e80 r8:8027f5e8 r7:eb725e60 r6:848a7f00 r5:85460000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85225100 INFO: task kworker/1:652:5118 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c3a75000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:5119 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:5119 tgid:5119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb735d84 r8:00000002 r7:60000013 r6:eb735d8c r5:85460c00 r4:85460c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85460c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85225480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85460c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ef000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85420b8c r4:85420800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85420b8c r4:848a7f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85460c00 r8:848a7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a7f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a7f80 r8:8027f5e8 r7:eb731e60 r6:84a53000 r5:85460c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb735fb0 to 0xeb735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85225280 INFO: task kworker/1:653:5119 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c3a75000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:5121 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:5121 tgid:5121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb739d84 r8:00000002 r7:60000113 r6:eb739d8c r5:85462400 r4:85462400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85462400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85225ac0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85462400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85421b8c r4:85421800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85421b8c r4:84a53080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85462400 r8:84a530ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53080 r8:8027f5e8 r7:eb731e60 r6:84a53100 r5:85462400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85225600 INFO: task kworker/1:654:5121 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c3f76000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:5124 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:5124 tgid:5124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb719d84 r8:00000002 r7:60000113 r6:eb719d8c r5:84948c00 r4:84948c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84948c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84948c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0263000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536f78c r4:8536f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536f78c r4:85222d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84948c00 r8:85222d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85222d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222d00 r8:8027f5e8 r7:eb5f5e60 r6:85222d80 r5:84948c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb719fb0 to 0xeb719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852274c0 INFO: task kworker/0:343:5124 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c3f76000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:5125 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:5125 tgid:5125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84949800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r5:00001000 r4:eb61f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542138c r4:85421000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542138c r4:84a53200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84949800 r8:84a5322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53200 r8:8027f5e8 r7:eb739e60 r6:85222e00 r5:84949800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb741fb0 to 0xeb741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85225900 INFO: task kworker/1:655:5125 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c3f76000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8494a400 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85225940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8494a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb631000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542078c r4:85420400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542078c r4:84a53180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494a400 r8:84a531ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53180 r8:8027f5e8 r7:eb739e60 r6:85222e80 r5:8494a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852250c0 INFO: task kworker/1:656:5127 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c4433000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5db000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85349f8c r4:84a53280 Exception stack(0xeb73dfb0 to 0xeb73dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85225c80 INFO: task kworker/1:657:5132 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c48e4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:5133 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:8494bc00 r4:8494bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85355500 r5:00001000 r4:e072b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a5f8c r4:853a5c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a5f8c r4:85222f80 r10:61c88647 r9:8494bc00 r8:85222fac r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:344:5133 is blocked on a mutex likely owned by task kworker/1:364:4416. Exception stack(0xeae89d28 to 0xeae89d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:848b5600 r4:00000001 Exception stack(0xeae89fb0 to 0xeae89ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:8494c800 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb751fb0 to 0xeb751ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c4f73000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:5136 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:5136 tgid:5136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb74dd84 r8:00000002 r7:60000013 r6:eb74dd8c r5:8494d400 r4:8494d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227c40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8494d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4a22000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a4b8c r4:853a4800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a4b8c r4:84a98100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494d400 r8:84a9812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98100 r8:8027f5e8 r7:eb641e60 r6:84a98180 r5:8494d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb74dfb0 to 0xeb74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85227a00 INFO: task kworker/0:345:5136 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeae89fb0 to 0xeae89ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:346 state:D stack:0 pid:5138 tgid:5138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb759d84 r8:00000002 r7:60000113 r6:eb759d8c r5:8494ec00 r4:8494ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb759e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85355280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8494ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa79000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a538c r4:853a5000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a538c r4:84a98200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494ec00 r8:84a9822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98200 r8:8027f5e8 r7:eb641e60 r6:84a98280 r5:8494ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85227dc0 INFO: task kworker/0:346:5138 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c514a000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:8494e000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8494e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542238c r4:85422000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542238c r4:84a53380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494e000 r8:84a533ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53380 r8:8027f5e8 r7:eb73de60 r6:84a98300 r5:8494e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85225e80 INFO: task kworker/1:659:5140 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r5:80000113 r4:80239bb0 r4:eae89dc0 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85225b80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85463000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85421f8c r4:85421c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85421f8c r4:84a53400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85463000 r8:84a5342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53400 r8:8027f5e8 r7:eb73de60 r6:84a53480 r5:85463000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85225fc0 INFO: task kworker/1:660:5141 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c5649000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85464800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08 r5:00001000 r4:ead93000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85422b8c r4:84a53500 Exception stack(0xeb765fb0 to 0xeb765ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c5a8b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:eb769d84 r8:00000002 r7:60000113 r6:eb769d8c r5:85465400 r4:00000000 r4:00000000 r5:00001000 r4:eaed7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84a53600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:663:5148 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:663 state:D stack:0 pid:5148 tgid:5148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb76dd84 r8:00000002 r7:60000113 r6:eb76dd8c r5:85466000 r4:85466000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85466000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84737d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85466000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb599000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85349b8c r4:85349800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85349b8c r4:84a53700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85466000 r8:84a5372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53700 r8:8027f5e8 r7:eb73de60 r6:84a53780 r5:85466000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb76dfb0 to 0xeb76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a5e080 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:5152 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:5152 tgid:5152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85461800 r4:00000000 r9:83018005 r8:85461800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 r5:00001000 r4:dfead000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853a578c r4:84a98400 Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918888 r9:eb50dd84 r8:00000002 r7:60000013 r6:eb50dd8c r5:8545ec00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85355a80 r5:00001000 r4:eafa9000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb50dfb0 to 0xeb50dff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:85466c00 r4:85466c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85466c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85355600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85466c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a5b8c r4:853a5800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a5b8c r4:84a98500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85466c00 r8:84a9852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98500 r8:8027f5e8 r7:eb50de60 r6:84a53900 r5:85466c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85355440 INFO: task kworker/0:349:5155 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c6bf7000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae23000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eae6b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853a638c r4:84a98600 r10:61c88647 r9:84a21800 r8:84a9862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98600 r8:8027f5e8 r7:eb50de60 r6:84a53a00 r5:84a21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85355780 INFO: task kworker/0:351:5159 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c6bf7000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:5161 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:5161 tgid:5161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb789d84 r8:00000002 r7:60000113 r6:eb789d8c r5:84a23000 r4:84a23000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a23000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85355940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a23000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeab000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a6b8c r4:853a6800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a6b8c r4:84a98680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a23000 r8:84a986ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98680 r8:8027f5e8 r7:eb50de60 r6:84a53a80 r5:84a23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:352:5161 is blocked on a mutex likely owned by task kworker/1:364:4416. r5:80000113 r4:80239bb0 r4:eae89dc0 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:353 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb795d84 r8:00000002 r7:60000113 r6:eb795d8c r5:84a22400 r4:84a22400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a22400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a22400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb151000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a438c r4:853a4000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a438c r4:84a98700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a22400 r8:84a9872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98700 r8:8027f5e8 r7:eb50de60 r6:84a53b00 r5:84a22400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85355980 INFO: task kworker/0:353:5164 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c7702000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84a24800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a778c r4:853a7400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a778c r4:84a98780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a24800 r8:84a987ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98780 r8:8027f5e8 r7:eb795e60 r6:84a53b80 r5:84a24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85355980 INFO: task kworker/0:354:5166 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c7702000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:00001000 r4:ecf8f000 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:5167 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:5167 tgid:5167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb7a1d84 r8:00000002 r7:60000113 r6:eb7a1d8c r5:84a23c00 r4:84a23c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a23c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85355dc0 r5:00001000 r4:eb015000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb099000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:853a738c r4:84a98880 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:eb7b1d84 r8:00000002 r7:60000113 r6:eb7b1d8c r5:84a25400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84746000 r5:00001000 r4:eb119000 r5:853a7f8c r4:853a7c00 r10:61c88647 r9:84a25400 r8:84a9892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355c00 Call trace: r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c813e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:5174 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:358 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:84a26000 r4:84a26000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a26000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7a080 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a26000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb195000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536478c r4:85364400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536478c r4:84a98980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a26000 r8:84a989ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98980 r8:8027f5e8 r7:eb795e60 r6:84a53d80 r5:84a26000 Exception stack(0xeb7bdfb0 to 0xeb7bdff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:847da040 Workqueue: events bpf_prog_free_deferred r5:8545d400 r4:82918884 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb383000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536578c r4:85365400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536578c r4:84a98a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545d400 r8:84a98a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98a00 r8:8027f5e8 r7:eb7bde60 r6:84a53e00 r5:8545d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b7a1c0 INFO: task kworker/0:359:5176 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c85ed000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85468000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:00001000 r4:eb29d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8536438c r4:84a98a80 Exception stack(0xeb7c9fb0 to 0xeb7c9ff8) INFO: task kworker/0:360:5177 is blocked on a mutex likely owned by task kworker/1:364:4416. r5:80000113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:361:5179 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:5179 tgid:5179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918888 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:85469800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7a2c0 r5:00001000 r4:eb321000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85469800 r8:84a98b2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b7a140 INFO: task kworker/0:361:5179 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c8b07000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb345000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85468c00 r8:84a98bac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb378000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85364f8c r4:84a98c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:364:5185 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:364 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb7e9d84 r8:00000002 r7:60000113 r6:eb7e9d8c r5:8546c800 r4:8546c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8546c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7aac0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8546c800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3fb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85365f8c r4:85365c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85365f8c r4:84a98c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8546c800 r8:84a98cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98c80 r8:8027f5e8 r7:eb7c5e60 r6:84a9c080 r5:8546c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e9fb0 to 0xeb7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b7a300 INFO: task kworker/0:364:5185 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb3a7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85365b8c r4:85365800 r4:84a98d80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7aa40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8546b000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3bf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536638c r4:85366000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536638c r4:84a98d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8546b000 r8:84a98d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98d00 r8:8027f5e8 r7:eb7e9e60 r6:84a9c180 r5:8546b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b7a800 INFO: task kworker/0:366:5189 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c9756000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:367:5191 blocked for more than 459 seconds. r5:8546ec00 r4:82918884 r4:00000000 r9:83018005 r8:8546ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:00001000 r4:eb42f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b7aa00 INFO: task kworker/0:367:5191 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: c9a2f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:5193 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:5193 tgid:5193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb809d84 r8:00000002 r7:60000113 r6:eb809d8c r5:84a26c00 r4:84a26c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a26c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7ac00 r5:00001000 r4:eb417000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8536678c r4:84a98e80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47f000 r7:dddced80 r6:83018000 r5:8536778c r4:84a98f80 Exception stack(0xeb811fb0 to 0xeb811ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb443000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85366f8c r4:85366c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85366f8c r4:84a98f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85463c00 r8:84a98f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a98f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a98f00 r8:8027f5e8 r7:eb811e60 r6:84a9c380 r5:85463c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb819fb0 to 0xeb819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b7ad00 INFO: task kworker/0:370:5197 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ca7d4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:371:5199 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:371 state:D stack:0 pid:5199 tgid:5199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb821d84 r8:00000002 r7:60000013 r6:eb821d8c r5:85470c00 r4:85470c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85470c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5e700 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb457000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536738c r4:85367000 r7:dddced80 r6:83018000 r5:8536738c r4:84a98380 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: ca7d4000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85472400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 r5:00001000 r4:dfac1000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb829fb0 to 0xeb829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85227000 INFO: task kworker/0:372:5201 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ca7d4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:373:5203 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:373 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb4b5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85367f8c r4:853c7080 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85470000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb839e08 r9:83018005 r8:85470000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:00001000 r4:eb4cf000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9280 INFO: task kworker/0:374:5205 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cb131000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:5207 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:5207 tgid:5207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85471800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r5:00001000 r4:eb4f3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8534838c r4:85348000 r10:61c88647 r9:85471800 r8:853c71ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) INFO: task kworker/0:376:5209 blocked for more than 459 seconds. [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9380 r5:00001000 r4:eb515000 r7:dddced80 r6:83018000 r5:8534878c r4:853c7200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:5211 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:5211 tgid:5211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb851d84 r8:00000002 r7:60000113 r6:eb851d8c r5:85474800 r4:85474800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85474800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c94c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85474800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb539000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85348b8c r4:85348800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85348b8c r4:853c7280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85474800 r8:853c72ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c7280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c7280 r8:8027f5e8 r7:eb829e60 r6:84a9c700 r5:85474800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c93c0 INFO: task kworker/0:377:5211 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cb438000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:378:5213 blocked for more than 459 seconds. [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9740 r5:00001000 r4:eb555000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:853c7300 9fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:379 state:D stack:0 pid:5215 tgid:5215 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb587000 r5:85348f8c r4:85348c00 r4:853c7380 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eae89dc0 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:5217 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:5217 tgid:5217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb865d84 r8:00000002 r7:60000113 r6:eb865d8c r5:85473c00 r4:85473c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85473c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9e00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85473c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534978c r4:85349400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534978c r4:853c7400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85473c00 r8:853c742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c7400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c7400 r8:8027f5e8 r7:eb829e60 r6:84a9c880 r5:85473c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb865fb0 to 0xeb865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9800 INFO: task kworker/0:380:5217 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cc17d000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 r4:8546d400 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84737dc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8546d400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542338c r4:85423000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542338c r4:84a9c900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8546d400 r8:84a9c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9c900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9c900 r8:8027f5e8 r7:eb73de60 r6:84a9c980 r5:8546d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84737280 INFO: task kworker/1:664:5219 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cc219000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Not tainted 6.15.0-syzkaller #0 r4:84010000 r4:00000000 r9:83018205 r8:84010000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:00001000 r4:eab93000 r7:ddde2d80 r6:83018200 r5:85423b8c r4:84a9ca00 1fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ced80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84011800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534bb8c r4:8534b800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534bb8c r4:853c7480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84011800 r8:853c74ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c7480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c7480 r8:8027f5e8 r7:eb829e60 r6:84a9cb00 r5:84011800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb869fb0 to 0xeb869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c9fc0 INFO: task kworker/0:381:5226 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cc530000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 task:kworker/0:382 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e07af000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8534a38c r4:853c7500 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r9:83018205 r8:84013000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r5:00001000 r4:e09e1000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542378c r4:84a9cc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84013000 r8:84a9cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9cc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9cc00 r8:8027f5e8 r7:eb771e60 r6:84a9cc80 r5:84013000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bb1c0 INFO: task kworker/1:666:5228 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ccb82000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:5231 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:5231 tgid:5231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb85dd84 r8:00000002 r7:60000113 r6:eb85dd8c r5:84013c00 r4:84013c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84013c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb85de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bbc40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84013c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543c38c r4:8543c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543c38c r4:84a9cd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84013c00 r8:84a9cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9cd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9cd00 r8:8027f5e8 r7:eb771e60 r6:84a9cd80 r5:84013c00 dfa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfc27000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:5234 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:5234 tgid:5234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb87dd84 r8:00000002 r7:60000013 r6:eb87dd8c r5:84015400 r4:84015400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84015400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bb700 r5:00001000 r4:ead27000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ead89000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb881fb0 to 0xeb881ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:670:5238 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:670 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb879d84 r8:00000002 r7:60000113 r6:eb879d8c r5:84016000 r4:84016000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84016000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bbe40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84016000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543cb8c r4:8543c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543cb8c r4:853bc080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84016000 r8:853bc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bc080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc080 r8:8027f5e8 r7:eb85de60 r6:853bc100 r5:84016000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bbb80 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:671 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eaf65000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:853bc180 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cda3f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:5243 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:84948000 r4:84948000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84948000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c9c80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84948000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb615000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ecf8f000 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:673:5244 blocked for more than 460 seconds. [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cb500 r5:00001000 r4:eb6e1000 r5:8543e38c r4:8543e000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ebc00 r8:853bc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bc300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc300 r8:8027f5e8 r7:eb895e60 r6:853c7680 r5:853ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb899fb0 to 0xeb899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bbec0 INFO: task kworker/1:673:5244 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cdc6b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:5246 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:5246 tgid:5246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb8a1d84 r8:00000002 r7:60000013 r6:eb8a1d8c r5:854f0c00 r4:854f0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f0c00 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 r5:00001000 r4:eb629000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543cf8c r4:8543cc00 r7:ddde2d80 r6:83018200 r5:8543cf8c r4:853bc380 1fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb639000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8543d78c r4:8543d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543d78c r4:853bc400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400c00 r8:853bc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bc400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc400 r8:8027f5e8 r7:eb899e60 r6:853bc480 r5:85400c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb88dfb0 to 0xeb88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5e240 INFO: task kworker/1:675:5248 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ce095000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:5250 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:5250 tgid:5250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb889d84 r8:00000002 r7:60000013 r6:eb889d8c r5:85401800 r4:85401800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85401800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb651000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543db8c r4:8543d800 r7:ddde2d80 r6:83018200 r5:8543db8c r4:853bc500 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:677 state:D stack:0 pid:5253 tgid:5253 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cb280 r5:00001000 r4:eb661000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: ce89c000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:eae89dc0 r5:00001000 r4:ecf8f000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:5254 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb8add84 r8:00000002 r7:60000113 r6:eb8add8c r5:85404800 r4:85404800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85404800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cbbc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85404800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543eb8c r4:8543e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543eb8c r4:853bc700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85404800 r8:853bc72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bc700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc700 r8:8027f5e8 r7:eb899e60 r6:853bc780 r5:85404800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8adfb0 to 0xeb8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cb3c0 INFO: task kworker/1:678:5254 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cea5b000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:85402400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b1e08 r9:83018205 r8:85402400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:00001000 r4:eb6f1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8543e78c r4:8543e400 r4:853bc800 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: cf019000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb70d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8543ef8c r4:853bc900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85403c00 r8:853bc92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bc900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bc900 r8:8027f5e8 r7:eb8ade60 r6:853bc980 r5:85403c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b5fb0 to 0xeb8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cb840 INFO: task kworker/1:680:5258 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cf019000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:5260 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:5260 tgid:5260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb8bdd84 r8:00000002 r7:60000113 r6:eb8bdd8c r5:85405400 r4:85405400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cc040 r5:00001000 r4:eaebd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543fb8c r4:8543f800 r7:ddde2d80 r6:83018200 r5:8543fb8c r4:853bca00 dfa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:682:5262 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:682 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb8cdd84 r8:00000002 r7:60000013 r6:eb8cdd8c r5:854f3000 r4:854f3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cb380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543f78c r4:8543f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543f78c r4:853bcb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f3000 r8:853bcb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bcb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bcb00 r8:8027f5e8 r7:eb8bde60 r6:853c7780 r5:854f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cbd00 INFO: task kworker/1:682:5262 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: cf434000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:683 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eae65000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8543f38c r4:853bcb80 5fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:5267 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:5267 tgid:5267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:854f4800 r4:854f4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cec00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0811000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534b78c r4:8534b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534b78c r4:853c7880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f4800 r8:853c78ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c7880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c7880 r8:8027f5e8 r7:eb869e60 r6:853c7900 r5:854f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a5fb0 to 0xeb8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cea00 INFO: task kworker/0:384:5267 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: cfae0000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 task:kworker/0:385 state:D stack:0 pid:5268 tgid:5268 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e0941000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8548178c r4:853c7980 Exception stack(0xeb8c5fb0 to 0xeb8c5ff8) r4:853cebc0 Workqueue: events bpf_prog_free_deferred 9d20: cfae0000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:5270 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb78dd84 r8:00000002 r7:60000113 r6:eb78dd8c r5:854f6000 r4:854f6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ce940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534af8c r4:8534ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534af8c r4:853c7a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f6000 r8:853c7aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c7a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c7a80 r8:8027f5e8 r7:eb8c5e60 r6:853c7b00 r5:854f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r9:83018205 r8:854f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:00001000 r4:eb372000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:685:5275 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:5275 tgid:5275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb8d5d84 r8:00000002 r7:60000113 r6:eb8d5d8c r5:854f2400 r4:854f2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cc400 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb147000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543ff8c r4:8543fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543ff8c r4:853bcc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f2400 r8:853bccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bcc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bcc80 r8:8027f5e8 r7:eb7b5e60 r6:853c7c00 r5:854f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d5fb0 to 0xeb8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cc100 INFO: task kworker/1:685:5275 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb013000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d0aa5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:388:5279 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:5279 tgid:5279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb7a5d84 r8:00000002 r7:60000113 r6:eb7a5d8c r5:854f6c00 r4:854f6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb09f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8534bf8c r4:853c7d80 Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb331000 r5:8548078c r4:85480400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84740080 INFO: task kworker/0:389:5281 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d0fbf000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:686:5283 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:686 state:D stack:0 pid:5283 tgid:5283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb8e1d84 r8:00000002 r7:60000113 r6:eb8e1d8c r5:854f8000 r4:854f8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cc600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552c38c r4:8552c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853bcd00 1fa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80000113 r4:80239bb0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552cb8c r4:8552c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552cb8c r4:853bcd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f8c00 r8:853bcdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bcd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bcd80 r8:8027f5e8 r7:eb7b5e60 r6:853c1000 r5:854f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cc3c0 INFO: task kworker/1:687:5285 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d1332000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb397000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:854f9800 r8:853c10ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r5:00001000 r4:eb4cd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8552eb8c r4:8552e800 r10:61c88647 r9:854fa400 r8:853bce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853cc8c0 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d1598000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:5292 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:5292 tgid:5292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb8e9d84 r8:00000002 r7:60000013 r6:eb8e9d8c r5:854fb000 r4:854fb000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fb000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eb3af000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8552cf8c r4:8552cc00 r10:61c88647 r9:854fb000 r8:853bceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:854fbc00 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847407c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85480b8c r4:85480800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85480b8c r4:853c1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fbc00 r8:853c12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1280 r8:8027f5e8 r7:eb8c5e60 r6:853c1300 r5:854fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f5fb0 to 0xeb8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847406c0 INFO: task kworker/0:391:5293 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r5:854fc800 r4:82918884 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84740f80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e021d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548138c r4:85481000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548138c r4:853c1380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fc800 r8:853c13ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:854fd400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb423000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d1b7e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:691:5299 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:691 state:D stack:0 pid:5299 tgid:5299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb901d84 r8:00000002 r7:60000013 r6:eb901d8c r5:854fe000 r4:854fe000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ccec0 r5:00001000 r4:eb43b000 r5:8552db8c r4:8552d800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb453000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:854b6000 r8:8027f5e8 r7:eb8ede60 r6:853c1580 r5:854fec00 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:5303 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:693 state:D stack:0 pid:5303 tgid:5303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb90dd84 r8:00000002 r7:60000113 r6:eb90dd8c r5:84958c00 r4:84958c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84958c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cc0c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84958c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb481000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552e38c r4:8552e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552e38c r4:854b6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84958c00 r8:854b60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6080 r8:8027f5e8 r7:eb8ede60 r6:853c1600 r5:84958c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb90dfb0 to 0xeb90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cce00 INFO: task kworker/1:693:5303 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:84958000 r4:82918884 r5:00001000 r4:eb4bd000 r5:8552e78c r4:8552e400 Exception stack(0xeb915fb0 to 0xeb915ff8) Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:695:5310 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:695 state:D stack:0 pid:5310 tgid:5310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb919d84 r8:00000002 r7:60000113 r6:eb919d8c r5:8495a400 r4:8495a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb919e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b80c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eae5b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8495a400 r8:854b61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r5:00001000 r4:ecf8f000 r4:00000001 task:kworker/0:393 state:D stack:0 pid:5311 tgid:5311 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb8f9fb0 to 0xeb8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84737180 INFO: task kworker/0:393:5311 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d2ff1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:394 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb531000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 9d20: d31cb000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b7400 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8495c800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead65000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548238c r4:85482000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548238c r4:853c1980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495c800 r8:853c19ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b7780 r4:853c1a80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b7200 INFO: task kworker/0:396:5316 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d3670000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:696 state:D stack:0 pid:5318 tgid:5318 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b8b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495e000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552f78c r4:8552f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552f78c r4:854b6200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495e000 r8:854b622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb929fb0 to 0xeb929ff8) r4:00000000 r4:eae89dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b8800 r5:00001000 r4:eb5ab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d3add000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:5322 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:5322 tgid:5322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb935d84 r8:00000002 r7:60000013 r6:eb935d8c r5:85406c00 r4:85406c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85406c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b7940 r4:00000000 r5:00001000 r4:eb549000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85482f8c r4:85482c00 Exception stack(0xeb935fb0 to 0xeb935ff8) r4:853b78c0 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:5324 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:5324 tgid:5324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb93dd84 r8:00000002 r7:60000013 r6:eb93dd8c r5:85400000 r4:85400000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85400000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b7d80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85400000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85483b8c r4:85483800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85483b8c r4:853c1c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400000 r8:853c1cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1c80 r8:8027f5e8 r7:eb935e60 r6:854b6400 r5:85400000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb93dfb0 to 0xeb93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b7900 INFO: task kworker/0:398:5324 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d4048000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:5326 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:5326 tgid:5326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb945d84 r8:00000002 r7:60000113 r6:eb945d8c r5:85478c00 r4:85478c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85478c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b7a80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85478c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb589000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548338c r4:85483000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548338c r4:853c1d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85478c00 r8:853c1d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1d00 r8:8027f5e8 r7:eb93de60 r6:854b6480 r5:85478c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b7900 INFO: task kworker/0:399:5326 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d4578000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:5328 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb92dd84 r8:00000002 r7:60000113 r6:eb92dd8c r5:85479800 r4:85479800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85479800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b7d00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85479800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548378c r4:85483400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548378c r4:853c1d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85479800 r8:853c1dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1d80 r8:8027f5e8 r7:eb93de60 r6:854b6500 r5:85479800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b7bc0 INFO: task kworker/0:400:5328 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d4578000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:5331 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:5331 tgid:5331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb94dd84 r8:00000002 r7:60000013 r6:eb94dd8c r5:8547b000 r4:8547b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb94de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b8440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8547b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb09000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552fb8c r4:8552f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552fb8c r4:854b6580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547b000 r8:854b65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b6580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6580 r8:8027f5e8 r7:eb929e60 r6:854b6600 r5:8547b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb94dfb0 to 0xeb94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b8980 INFO: task kworker/1:698:5331 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d4578000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:5333 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb955d84 r8:00000002 r7:60000013 r6:eb955d8c r5:8547c800 r4:8547c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb955e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ad5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547c800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85496f8c r4:85496c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85496f8c r4:853c1e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547c800 r8:853c1e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1e00 r8:8027f5e8 r7:eb93de60 r6:854b6680 r5:8547c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb955fb0 to 0xeb955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b7f00 INFO: task kworker/0:401:5333 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d4578000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:5334 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:5334 tgid:5334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb959d84 r8:00000002 r7:60000113 r6:eb959d8c r5:8547d400 r4:8547d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb959e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b7f80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb601000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85481b8c r4:85481800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85481b8c r4:853c1e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547d400 r8:853c1eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1e80 r8:8027f5e8 r7:eb955e60 r6:854b6700 r5:8547d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb959fb0 to 0xeb959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b73c0 INFO: task kworker/0:402:5334 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d4969000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:5336 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb961d84 r8:00000002 r7:60000113 r6:eb961d8c r5:8547bc00 r4:8547bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb961e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bb040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e4b8c r4:847e4800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e4b8c r4:853c1f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547bc00 r8:853c1f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1f00 r8:8027f5e8 r7:eb955e60 r6:854b6780 r5:8547bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb961fb0 to 0xeb961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b7f40 INFO: task kworker/0:403:5336 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d4df1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:5338 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:5338 tgid:5338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb969d84 r8:00000002 r7:60000113 r6:eb969d8c r5:8547ec00 r4:8547ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bb780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36e000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85535b8c r4:85535800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85535b8c r4:853c1f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547ec00 r8:853c1fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1f80 r8:8027f5e8 r7:eb955e60 r6:854b6800 r5:8547ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb969fb0 to 0xeb969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854bb000 INFO: task kworker/0:404:5338 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d4df1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:699:5341 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:699 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb965d84 r8:00000002 r7:60000113 r6:eb965d8c r5:8547e000 r4:8547e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84741a00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8547e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac65000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552f38c r4:8552f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552f38c r4:854b6880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547e000 r8:854b68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b6880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6880 r8:8027f5e8 r7:eb94de60 r6:854b6900 r5:8547e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb965fb0 to 0xeb965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b8680 INFO: task kworker/1:699:5341 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d5351000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:5344 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:5344 tgid:5344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb941d84 r8:00000002 r7:60000113 r6:eb941d8c r5:8547a400 r4:8547a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb941e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84740d00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8547a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae33000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552ff8c r4:8552fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552ff8c r4:854b6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547a400 r8:854b69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6980 r8:8027f5e8 r7:eb965e60 r6:854b6a00 r5:8547a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb941fb0 to 0xeb941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b88c0 INFO: task kworker/1:700:5344 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d56c8000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:701:5346 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:701 state:D stack:0 pid:5346 tgid:5346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb96dd84 r8:00000002 r7:60000113 r6:eb96dd8c r5:85478000 r4:85478000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85478000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b7b80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85478000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843b878c r4:843b8400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843b878c r4:854b6a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85478000 r8:854b6aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b6a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6a80 r8:8027f5e8 r7:eb941e60 r6:854b6b00 r5:85478000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741ec0 INFO: task kworker/1:701:5346 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d56c8000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:702:5348 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:5348 tgid:5348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb971d84 r8:00000002 r7:60000113 r6:eb971d8c r5:85406000 r4:85406000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85406000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be2c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85406000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85534b8c r4:85534800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85534b8c r4:854b6b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85406000 r8:854b6bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b6b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6b80 r8:8027f5e8 r7:eb96de60 r6:854b6c00 r5:85406000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb971fb0 to 0xeb971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b7f40 INFO: task kworker/1:702:5348 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d586d000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:703:5349 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:703 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb925d84 r8:00000002 r7:60000113 r6:eb925d8c r5:85568000 r4:85568000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85568000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be080 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85568000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553438c r4:85534000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553438c r4:854b6c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568000 r8:854b6cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b6c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6c80 r8:8027f5e8 r7:eb971e60 r6:854b6d00 r5:85568000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb925fb0 to 0xeb925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854be1c0 INFO: task kworker/1:703:5349 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d5e29000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:5352 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:5352 tgid:5352 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb975d84 r8:00000002 r7:60000013 r6:eb975d8c r5:85568c00 r4:85568c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85568c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85568c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553578c r4:85535400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553578c r4:854b6d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568c00 r8:854b6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b6d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6d80 r8:8027f5e8 r7:eb971e60 r6:854b6e00 r5:85568c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb975fb0 to 0xeb975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854be140 INFO: task kworker/1:704:5352 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d6302000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:5354 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb97dd84 r8:00000002 r7:60000113 r6:eb97dd8c r5:85569800 r4:85569800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85569800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85569800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85534f8c r4:85534c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85534f8c r4:854b6e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85569800 r8:854b6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b6e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6e80 r8:8027f5e8 r7:eb975e60 r6:854b6f00 r5:85569800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb97dfb0 to 0xeb97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854be540 INFO: task kworker/1:705:5354 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d6302000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r5:00001000 r4:eb1a7000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854b6f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b6f80 r8:8027f5e8 r7:eb975e60 r6:853bf000 r5:8556b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb979fb0 to 0xeb979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854be540 INFO: task kworker/1:706:5356 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d6302000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8556bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08 r5:00001000 r4:eb399000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553538c r4:85535000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8556bc00 r8:853bf0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854be6c0 INFO: task kworker/1:707:5357 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d6302000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb989e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8553638c r4:853bf180 Exception stack(0xeb989fb0 to 0xeb989ff8) r4:854be380 Call trace: 9d20: d68ba000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:eb98dd84 r8:00000002 r7:60000113 r6:eb98dd8c r5:8556c800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a4800 r5:00001000 r4:e8a9f000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e538c r4:847e5000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e538c r4:854bf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556c800 r8:854bf02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854bf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bf000 r8:8027f5e8 r7:eb955e60 r6:853bf280 r5:8556c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb98dfb0 to 0xeb98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854bb7c0 INFO: task kworker/0:405:5361 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d68ba000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:5363 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb465000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553678c r4:85536400 r7:ddde2d80 r6:83018200 r5:8553678c r4:853bf300 Exception stack(0xeb995fb0 to 0xeb995ff8) r4:854bea80 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eae89dc0 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:710:5365 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:5365 tgid:5365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb999d84 r8:00000002 r7:60000113 r6:eb999d8c r5:8556e000 r4:8556e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b0040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556e000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb413000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85535f8c r4:85535c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85535f8c r4:853bf400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556e000 r8:853bf42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bf400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bf400 r8:8027f5e8 r7:eb995e60 r6:853bf480 r5:8556e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb999fb0 to 0xeb999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854bedc0 INFO: task kworker/1:710:5365 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d7231000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:5367 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb991d84 r8:00000002 r7:60000013 r6:eb991d8c r5:85578000 r4:85578000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85578000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b01c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85578000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85536b8c r4:85536800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85536b8c r4:853bf500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85578000 r8:853bf52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bf500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bf500 r8:8027f5e8 r7:eb995e60 r6:853bf580 r5:85578000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b0300 INFO: task kworker/1:711:5367 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d7231000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:712:5370 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:712 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb985d84 r8:00000002 r7:60000113 r6:eb985d8c r5:85578c00 r4:85578c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85578c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b0780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85578c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb697000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85537b8c r4:85537800 r7:ddde2d80 r6:83018200 r5:85537b8c r4:853bf600 Exception stack(0xeb985fb0 to 0xeb985ff8) r4:854b0300 Call trace: r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:5372 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:713 state:D stack:0 pid:5372 tgid:5372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb9a1d84 r8:00000002 r7:60000113 r6:eb9a1d8c r5:85579800 r4:85579800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85579800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b03c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85579800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85536f8c r4:85536c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85536f8c r4:853bf700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85579800 r8:853bf72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bf700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bf700 r8:8027f5e8 r7:eb985e60 r6:853bf780 r5:85579800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b0540 INFO: task kworker/1:713:5372 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d78a7000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:714:5374 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:714 state:D stack:0 pid:5374 tgid:5374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb9a5d84 r8:00000002 r7:60000013 r6:eb9a5d8c r5:8557a400 r4:8557a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b0600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8557a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553738c r4:85537000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553738c r4:853bf800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557a400 r8:853bf82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bf800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bf800 r8:8027f5e8 r7:eb985e60 r6:853bf880 r5:8557a400 r4:00000001 Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918888 r9:eb9a9d84 r8:00000002 r7:60000113 r6:eb9a9d8c r5:8557b000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b0b80 r5:00001000 r4:eb70b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:843b978c r4:843b9400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb9a9fb0 to 0xeb9a9ff8) r4:854b06c0 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d20: d7c25000 ecf31000 00000001 80239b98 7f37f000 00000001 r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:716:5378 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:716 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb99dd84 r8:00000002 r7:60000113 r6:eb99dd8c r5:8557bc00 r4:8557bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b0840 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8557bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553778c r4:85537400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553778c r4:853bfa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557bc00 r8:853bfa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bfa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bfa00 r8:8027f5e8 r7:eb9a9e60 r6:853bfa80 r5:8557bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb99dfb0 to 0xeb99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b08c0 INFO: task kworker/1:716:5378 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d8031000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:717:5379 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:717 state:D stack:0 pid:5379 tgid:5379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb9add84 r8:00000002 r7:60000113 r6:eb9add8c r5:8557c800 r4:8557c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bebc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8557c800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85544b8c r4:85544800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85544b8c r4:853bfb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557c800 r8:853bfb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bfb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bfb00 r8:8027f5e8 r7:eb9a9e60 r6:853bfb80 r5:8557c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9adfb0 to 0xeb9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b0980 INFO: task kworker/1:717:5379 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r4:00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:00001000 r4:ecf8f000 r5:85a3578c r4:85a35400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:8557d400 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r5:00001000 r4:eb75d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8554438c r4:853bfc00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:854b0c00 INFO: task kworker/1:718:5381 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d8031000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeae89fb0 to 0xeae89ff8) r10:82918888 r9:eb9b5d84 r8:00000002 r7:60000113 r6:eb9b5d8c r5:8557e000 r5:00001000 r4:eb785000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8554478c r4:853bfd00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:5385 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:5385 tgid:5385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb9b9d84 r8:00000002 r7:60000013 r6:eb9b9d8c r5:8557ec00 r4:8557ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b0f00 r9:83018205 r8:8557ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r5:00001000 r4:eb7a9000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb7d5000 r7:ddde2d80 r6:83018200 r5:8554578c r4:853bff00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d9388000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:722 state:D stack:0 pid:5390 tgid:5390 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0737000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85537f8c r4:85537c00 Exception stack(0xeb9cdfb0 to 0xeb9cdff8) Call trace: r5:80000113 r4:80239bb0 r5:00001000 r4:ecf8f000 r4:00000001 r4:847da040 r4:85510c00 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508c300 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85510c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85545b8c r4:85545800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85545b8c r4:84a89080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85510c00 r8:84a890ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a89080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89080 r8:8027f5e8 r7:eb9cde60 r6:854bf100 r5:85510c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508c180 INFO: task kworker/1:723:5391 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d9825000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred r5:85514800 r4:82918884 r4:00000000 r4:00000000 r5:00001000 r4:eb7f5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8554538c r4:85545000 r10:61c88647 r9:85514800 r8:84a8912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:00001000 r4:eb805000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85513c00 r8:84a891ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89180 r8:8027f5e8 r7:eb9cde60 r6:854bf200 r5:85513c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508c180 INFO: task kworker/1:725:5395 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: d9de1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:726:5397 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:726 state:D stack:0 pid:5397 tgid:5397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb9e5d84 r8:00000002 r7:60000013 r6:eb9e5d8c r5:85515400 r4:85515400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85515400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508c4c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85515400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb815000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554678c r4:85546400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554678c r4:84a89200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85515400 r8:84a8922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a89200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89200 r8:8027f5e8 r7:eb9cde60 r6:854bf280 r5:85515400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e5fb0 to 0xeb9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508c640 INFO: task kworker/1:726:5397 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeae89fb0 to 0xeae89ff8) r4:847da040 Workqueue: events bpf_prog_free_deferred r5:85516c00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb825000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8554638c r4:85546000 r4:84a89280 Exception stack(0xeb9edfb0 to 0xeb9edff8) INFO: task kworker/1:727:5399 is blocked on a mutex likely owned by task kworker/1:364:4416. Exception stack(0xeae89d28 to 0xeae89d70) r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:5401 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb9f5d84 r8:00000002 r7:60000113 r6:eb9f5d8c r5:85511800 r4:85511800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85511800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508c9c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85511800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb835000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85546f8c r4:85546c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85546f8c r4:84a89300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85511800 r8:84a8932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a89300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89300 r8:8027f5e8 r7:eb9cde60 r6:854bf380 r5:85511800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f5fb0 to 0xeb9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb845000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508c980 INFO: task kworker/1:729:5404 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dac4e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:5405 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:5405 tgid:5405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918888 r9:eba05d84 r8:00000002 r7:60000113 r6:eba05d8c r5:85516000 r4:00000000 r4:00000000 r5:00001000 r4:dfad9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85547b8c r4:85547800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85547b8c r4:84a89400 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r4:eae89dc0 r5:00001000 r4:ecf8f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeae89fb0 to 0xeae89ff8) INFO: task kworker/1:731:5410 blocked for more than 461 seconds. r10:82918888 r9:eba11d84 r8:00000002 r7:60000113 r6:eba11d8c r5:8556ec00 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bb500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead29000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554778c r4:85547400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554778c r4:84a89480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556ec00 r8:84a894ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a89480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89480 r8:8027f5e8 r7:eb9cde60 r6:854bf500 r5:8556ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba11fb0 to 0xeba11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8508c7c0 INFO: task kworker/1:731:5410 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dac4e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:5411 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:5411 tgid:5411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba15d84 r8:00000002 r7:60000113 r6:eba15d8c r5:8495ec00 r4:8495ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead11000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555978c r4:85559400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:733:5412 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:733 state:D stack:0 pid:5412 tgid:5412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba1dd84 r8:00000002 r7:60000113 r6:eba1dd8c r5:85570c00 r4:85570c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85570c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85570c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb949000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85547f8c r4:85547c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85547f8c r4:84a89580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: db935000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:406:5413 blocked for more than 461 seconds. r4:85571800 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549478c r4:85494400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:407 state:D stack:0 pid:5417 tgid:5417 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb4df000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85494b8c r4:85494800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85494b8c r4:854bf780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85572400 r8:854bf7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854bf780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bf780 r8:8027f5e8 r7:eb955e60 r6:854bf800 r5:85572400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba19fb0 to 0xeba19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a4f00 INFO: task kworker/0:407:5417 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbe2c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:408:5419 blocked for more than 461 seconds. r10:82918888 r9:eb9c1d84 r8:00000002 r7:60000113 r6:eb9c1d8c r5:85573000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a4ac0 r5:00001000 r4:eb51b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85494f8c r4:854bf880 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:408:5419 is blocked on a mutex likely owned by task kworker/1:364:4416. Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:5420 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:5420 tgid:5420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb9ddd84 r8:00000002 r7:60000113 r6:eb9ddd8c r5:85573c00 r4:85573c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85573c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a43c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85573c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb577000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549578c r4:85495400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549578c r4:854bf980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85573c00 r8:854bf9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854bf980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bf980 r8:8027f5e8 r7:eb955e60 r6:854bfa00 r5:85573c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a4440 INFO: task kworker/0:409:5420 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dc3c7000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb597000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549538c r4:85495000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeba25fb0 to 0xeba25ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:5425 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:5425 tgid:5425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba2dd84 r8:00000002 r7:60000013 r6:eba2dd8c r5:85575400 r4:85575400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85575400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508cf80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85575400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85495b8c r4:85495800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85495b8c r4:854bfb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85575400 r8:854bfbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854bfb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bfb80 r8:8027f5e8 r7:eb955e60 r6:854bfc00 r5:85575400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a42c0 INFO: task kworker/0:411:5425 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred r4:85576000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08 r5:00001000 r4:eb5f7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549638c r4:85496000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549638c r4:854bfc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85576000 r8:854bfcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854bfc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bfc80 r8:8027f5e8 r7:eb955e60 r6:854bfd00 r5:85576000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba31fb0 to 0xeba31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ad080 INFO: task kworker/0:412:5426 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dca99000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848b5600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:413 state:D stack:0 pid:5429 tgid:5429 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb609000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85495f8c r4:85495c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85495f8c r4:854bfd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85576c00 r8:854bfdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854bfd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bfd80 r8:8027f5e8 r7:eb955e60 r6:854bfe00 r5:85576c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba35fb0 to 0xeba35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ad4c0 INFO: task kworker/0:413:5429 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dcb43000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:5431 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:5431 tgid:5431 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85570000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08 r9:83018005 r8:85570000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 r5:00001000 r4:eb62b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeba29fb0 to 0xeba29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ad240 INFO: task kworker/0:414:5431 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r4:eae89dc0 r5:00001000 r4:ecf8f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeae89fb0 to 0xeae89ff8) INFO: task kworker/0:415:5433 blocked for more than 461 seconds. Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb8c7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549738c r4:85497000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854bff80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ecf8f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85518c00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb911000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549678c r4:85496400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549678c r4:84a90080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85518c00 r8:84a900ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90080 r8:8027f5e8 r7:eba3de60 r6:84a90100 r5:85518c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba39fb0 to 0xeba39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ad880 INFO: task kworker/0:416:5435 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dd253000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:5437 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:5437 tgid:5437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba41d84 r8:00000002 r7:60000113 r6:eba41d8c r5:8551a400 r4:8551a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853adb80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8551a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85497b8c r4:85497800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:417:5437 is blocked on a mutex likely owned by task kworker/1:364:4416. 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:734 state:D stack:0 pid:5438 tgid:5438 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb843000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8555838c r4:84a89600 Exception stack(0xeba45fb0 to 0xeba45ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a93440 INFO: task kworker/1:734:5438 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dd881000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:5440 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:5440 tgid:5440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba51d84 r8:00000002 r7:60000113 r6:eba51d8c r5:85581800 r4:85581800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85581800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba51e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a4340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85581800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba89000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a078c r4:854a0400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a078c r4:84a90280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85581800 r8:84a902ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90280 r8:8027f5e8 r7:eba41e60 r6:84a89700 r5:85581800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853adc00 INFO: task kworker/0:418:5440 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:80000113 r4:80239bb0 r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeae89fb0 to 0xeae89ff8) INFO: task kworker/0:419:5442 blocked for more than 461 seconds. Call trace: r4:85584800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 r5:00001000 r4:eba59000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85584800 r8:84a9032c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ddb15000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:5444 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:5444 tgid:5444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba69d84 r8:00000002 r7:60000113 r6:eba69d8c r5:85583c00 r4:85583c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85583c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ade40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85583c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549778c r4:85497400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549778c r4:84a90380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85583c00 r8:84a903ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:420:5444 is blocked on a mutex likely owned by task kworker/1:364:4416. Exception stack(0xeae89d28 to 0xeae89d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85586c00 r4:82918884 r4:00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eba7d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85586c00 r8:84a9042c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:5448 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba8dd84 r8:00000002 r7:60000113 r6:eba8dd8c r5:85586000 r4:85586000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85586000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85586000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba99000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a038c r4:854a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a038c r4:84a90480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85586000 r8:84a904ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90480 r8:8027f5e8 r7:eba51e60 r6:84a89900 r5:85586000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba8dfb0 to 0xeba8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ade80 INFO: task kworker/0:422:5448 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de24a000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:5450 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba9dd84 r8:00000002 r7:60000113 r6:eba9dd8c r5:85585400 r4:85585400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85585400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85585400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a1b8c r4:854a1800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a1b8c r4:84a90500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85585400 r8:84a9052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90500 r8:8027f5e8 r7:eba8de60 r6:84a89980 r5:85585400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba9dfb0 to 0xeba9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:423:5450 is blocked on a mutex likely owned by task kworker/1:364:4416. Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de2af000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:ebab1d84 r8:00000002 r7:60000013 r6:ebab1d8c r5:85583000 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85583000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a0b8c r4:854a0800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a0b8c r4:84a90580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85583000 r8:84a905ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90580 r8:8027f5e8 r7:eba9de60 r6:84a89a00 r5:85583000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab1fb0 to 0xebab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4280 INFO: task kworker/0:424:5452 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85588c00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:854a0f8c r4:84a90600 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84be4280 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848b5600 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:5456 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:5456 tgid:5456 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebad1d84 r8:00000002 r7:60000113 r6:ebad1d8c r5:85588000 r4:85588000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85588000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4400 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85588000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a138c r4:854a1000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a138c r4:84a90680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85588000 r8:84a906ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90680 r8:8027f5e8 r7:eba9de60 r6:84a89b00 r5:85588000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad1fb0 to 0xebad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be42c0 INFO: task kworker/0:426:5456 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: deae4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:5458 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:5458 tgid:5458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebaddd84 r8:00000002 r7:60000113 r6:ebaddd8c r5:8558b000 r4:8558b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dff7d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a2b8c r4:854a2800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8558b000 r8:84a9072c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:427:5458 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ded9d000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:5460 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:8558a400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebae9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a178c r4:854a1400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a90780 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) r4:847da040 task:kworker/0:429 state:D stack:0 pid:5462 tgid:5462 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be46c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85589800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a1f8c r4:854a1c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a1f8c r4:84a90800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85589800 r8:84a9082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90800 r8:8027f5e8 r7:ebadde60 r6:84a89c80 r5:85589800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4740 INFO: task kworker/0:429:5462 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df139000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:eba49d84 r8:00000002 r7:60000013 r6:eba49d8c r5:85519800 r4:00000000 r4:00000000 r5:00001000 r4:ebb09000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854a238c r4:854a2000 r10:61c88647 r9:85519800 r8:84a908ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r4:8551b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4ac0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8551b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb15000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a278c r4:854a2400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a278c r4:84a90980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551b000 r8:84a909ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90980 r8:8027f5e8 r7:ebadde60 r6:84a90a00 r5:8551b000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfae5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eae8d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a338c r4:854a3000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a338c r4:84a90b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551c800 r8:84a90bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90b80 r8:8027f5e8 r7:ebadde60 r6:84a90c00 r5:8551c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4cc0 INFO: task kworker/0:433:5471 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df8cc000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:5472 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:5472 tgid:5472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:8551d400 r4:8551d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a937c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8551d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a378c r4:854a3400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a378c r4:84a90c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551d400 r8:84a90cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90c80 r8:8027f5e8 r7:ebb1de60 r6:84a90d00 r5:8551d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:5475 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:5475 tgid:5475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebb25d84 r8:00000002 r7:60000113 r6:ebb25d8c r5:8551ec00 r4:8551ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb25e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8551ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb173000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a878c r4:854a8400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a878c r4:84a90d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551ec00 r8:84a90dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90d80 r8:8027f5e8 r7:ebb1de60 r6:84a90e00 r5:8551ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb25fb0 to 0xebb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c7100 INFO: task kworker/0:435:5475 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d20: dfb6b000 ecf31000 00000001 80239b98 7f37f000 00000001 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eaff5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeba55fb0 to 0xeba55ff8) r4:854c7200 Workqueue: events bpf_prog_free_deferred 9d20: e00f0000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:eae89dc0 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:437:5478 blocked for more than 462 seconds. r10:82918888 r9:ebb29d84 r8:00000002 r7:60000013 r6:ebb29d8c r5:85520c00 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a838c r4:854a8000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a838c r4:84a90f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85520c00 r8:84a90fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a90f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a90f80 r8:8027f5e8 r7:ebb25e60 r6:854c6000 r5:85520c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb29fb0 to 0xebb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c7340 INFO: task kworker/0:437:5478 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e00f0000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb37f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:439:5482 blocked for more than 462 seconds. [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85522400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb327000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a8f8c r4:854a8c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a8f8c r4:854c6180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85522400 r8:854c61ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6180 r8:8027f5e8 r7:ebb2de60 r6:854c6200 r5:85522400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c7700 INFO: task kworker/0:439:5482 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e0ab3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb799000 r5:854ab38c r4:854ab000 r10:61c88647 r9:85520000 r8:854c62ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 INFO: task kworker/0:441:5486 blocked for more than 462 seconds. Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebb39d84 r8:00000002 r7:60000013 r6:ebb39d8c r5:8558d400 r4:8558d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7cc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a978c r4:854a9400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a978c r4:854c6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558d400 r8:854c63ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6380 r8:8027f5e8 r7:ebb35e60 r6:84a89d00 r5:8558d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c7940 INFO: task kworker/0:441:5486 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e0c28000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:442 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:8558e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:00001000 r4:eb427000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:80000113 r4:80239bb0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:847da040 Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebb4dd84 r8:00000002 r7:60000013 r6:ebb4dd8c r5:8558bc00 r4:8558bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a8b8c r4:854a8800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a8b8c r4:854c6480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558bc00 r8:854c64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6480 r8:8027f5e8 r7:ebb35e60 r6:84a89e00 r5:8558bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb4dfb0 to 0xebb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c7ec0 INFO: task kworker/0:443:5491 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e10bc000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:85a3578c r4:85a35400 r4:848b5600 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb4a1000 r7:dddced80 r6:83018000 r5:854aa38c r4:854c6500 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r5:00001000 r4:ecf8f000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82918888 r9:ebb55d84 r8:00000002 r7:60000013 r6:ebb55d8c r5:8558ec00 r4:8558ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cf300 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb657000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aa78c r4:854aa400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aa78c r4:854c6580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558ec00 r8:854c65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6580 r8:8027f5e8 r7:ebb35e60 r6:84a89f00 r5:8558ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb55fb0 to 0xebb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cf180 INFO: task kworker/0:445:5494 is blocked on a mutex likely owned by task kworker/1:364:4416. 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r5:85a3578c r4:85a35400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r4:00000000 r5:00001000 r4:eb6df000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:854c6600 r8:8027f5e8 r7:ebb35e60 r6:84a89f80 r5:8558c800 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:eae89dc0 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:5499 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebb45d84 r8:00000002 r7:60000113 r6:ebb45d8c r5:85590000 r4:85590000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85590000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cf500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85590000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb777000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aaf8c r4:854aac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aaf8c r4:854c6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85590000 r8:854c66ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6680 r8:8027f5e8 r7:ebb35e60 r6:854d3000 r5:85590000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb45fb0 to 0xebb45ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Call trace: [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cfb40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85592400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ed000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a9f8c r4:854a9c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a9f8c r4:854c6700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85592400 r8:854c672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6700 r8:8027f5e8 r7:ebb35e60 r6:854d3080 r5:85592400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb65fb0 to 0xebb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854cf600 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 r5:00001000 r4:eb7bf000 r7:dddced80 r6:83018000 r5:854ab78c r4:854c6780 dfa0: 00000000 00000000 00000000 00000000 9d20: e1ccd000 ecf31000 00000001 80239b98 7f37f000 00000001 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cf9c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85525400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7db000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854abf8c r4:854abc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854abf8c r4:854c6880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85525400 r8:854c68ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6880 r8:8027f5e8 r7:ebb65e60 r6:854c6900 r5:85525400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb61fb0 to 0xebb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cf900 INFO: task kworker/0:450:5506 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e1f71000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cfc40 r5:00001000 r4:eb81b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854abb8c r4:854ab800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854abb8c r4:854c6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85526000 r8:854c69ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6980 r8:8027f5e8 r7:ebb65e60 r6:854c6a00 r5:85526000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cf980 INFO: task kworker/0:451:5508 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r5:00001000 r4:ecf8f000 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:eb803000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:854a3f8c r4:854c6a80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:80000113 r4:80239bb0 r5:00001000 r4:ecf8f000 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Call trace: [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d9180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8551e000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85564b8c r4:85564800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85564b8c r4:854c6b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551e000 r8:854c6bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6b80 r8:8027f5e8 r7:ebb69e60 r6:854c6c00 r5:8551e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cfd80 INFO: task kworker/0:453:5512 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e2775000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:5513 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:5513 tgid:5513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebb5dd84 r8:00000002 r7:60000013 r6:ebb5dd8c r5:85524800 r4:85524800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85524800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r9:83018005 r8:85524800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r5:00001000 r4:eb82d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:854c6c80 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:735:5516 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:735 state:D stack:0 pid:5516 tgid:5516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebb81d84 r8:00000002 r7:60000113 r6:ebb81d8c r5:855d9800 r4:855d9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb81e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cce80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb88f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85558b8c r4:85558800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85558b8c r4:854d3100 r10:61c88647 r9:855d9800 r8:854d312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ebbc7000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r5:80000113 r4:80239bb0 r5:00001000 r4:ecf8f000 r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:5519 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:5519 tgid:5519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebb8dd84 r8:00000002 r7:60000013 r6:ebb8dd8c r5:855d8c00 r4:855d8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d9440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556438c r4:85564000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556438c r4:854c6e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d8c00 r8:854c6eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6e80 r8:8027f5e8 r7:ebb75e60 r6:854c6f00 r5:855d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb8dfb0 to 0xebb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:456:5521 blocked for more than 462 seconds. [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb9ef000 r7:dddced80 r6:83018000 r5:85564f8c r4:854c6f80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:80000113 r4:80239bb0 r4:00000000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:457:5524 blocked for more than 462 seconds. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d9800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb9b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556578c r4:85565400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556578c r4:854d2080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855dbc00 r8:854d20ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d2080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d2080 r8:8027f5e8 r7:ebb8de60 r6:854d2100 r5:855dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb79fb0 to 0xebb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d9540 INFO: task kworker/0:457:5524 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:eae89dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 r9:83018005 r8:855dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 r5:85565b8c r4:85565800 Exception stack(0xebb7dfb0 to 0xebb7dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d9600 INFO: task kworker/0:458:5525 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e3429000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:5528 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:5528 tgid:5528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebb99d84 r8:00000002 r7:60000113 r6:ebb99d8c r5:855dd400 r4:855dd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855dd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb99e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d98c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556538c r4:85565000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556538c r4:854d2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855dd400 r8:854d22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d2280 r8:8027f5e8 r7:ebb7de60 r6:854d2300 r5:855dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb99fb0 to 0xebb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d9600 INFO: task kworker/0:459:5528 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: e3429000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:5529 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:854d2380 r8:8027f5e8 r7:ebb7de60 r6:854d2400 r5:855de000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e3429000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 task:kworker/0:461 state:D stack:0 pid:5531 tgid:5531 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918888 r9:ebbb1d84 r8:00000002 r7:60000113 r6:ebbb1d8c r5:855dec00 r4:855dec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855dec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c3140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556678c r4:85566400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556678c r4:854d2480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855dec00 r8:854d24ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d2480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d2480 r8:8027f5e8 r7:ebba5e60 r6:854d2500 r5:855dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb1fb0 to 0xebbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d9ac0 INFO: task kworker/0:461:5531 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e37ca000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:737:5533 blocked for more than 462 seconds. r10:82918888 r9:ebbbdd84 r8:00000002 r7:60000113 r6:ebbbdd8c r5:85590c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e4140 r5:00001000 r4:dfae9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85558f8c r4:854d3200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85590c00 r8:854d322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3200 r8:8027f5e8 r7:eba15e60 r6:854d3280 r5:85590c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbbdfb0 to 0xebbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cc280 INFO: task kworker/1:737:5533 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e37ca000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 9fa0: 00000000 00000000 00000000 00000000 Call trace: r4:00000000 r5:00001000 r4:ebe2f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred r5:80000113 r4:80239bb0 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:85594800 r4:82918884 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e4300 r5:00001000 r4:e092b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85559b8c r4:85559800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85559b8c r4:854d3380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85594800 r8:854d33ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3380 r8:8027f5e8 r7:eba15e60 r6:854d3400 r5:85594800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd1fb0 to 0xebbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e4400 INFO: task kworker/1:738:5539 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e3b53000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 INFO: task kworker/1:739:5541 blocked for more than 462 seconds. r10:82918888 r9:eba09d84 r8:00000002 r7:60000113 r6:eba09d8c r5:85595400 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eba0d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:740:5542 blocked for more than 462 seconds. task:kworker/1:740 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba61d84 r8:00000002 r7:60000013 r6:eba61d8c r5:85596000 r4:85596000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85596000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e4380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85596000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf0b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85559f8c r4:85559c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85559f8c r4:854d3580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85596000 r8:854d35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3580 r8:8027f5e8 r7:eba09e60 r6:854d3600 r5:85596000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:854e4680 9d20: e4491000 ecf31000 00000001 80239b98 7f37f000 00000001 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918888 r9:eba65d84 r8:00000002 r7:60000113 r6:eba65d8c r5:85596c00 r4:00000000 r5:00001000 r4:eb4ff000 r5:8555a78c r4:8555a400 Exception stack(0xeba65fb0 to 0xeba65ff8) [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d20: e47ba000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:5546 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba85d84 r8:00000002 r7:60000013 r6:eba85d8c r5:855d8000 r4:855d8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e4880 r5:00001000 r4:eb547000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:855d8000 r8:854d37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 9fa0: 00000000 00000000 00000000 00000000 r5:847b0c00 r4:82918884 r4:00000000 r5:00001000 r4:eb5a5000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555a38c r4:8555a000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555a38c r4:854d3800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b0c00 r8:854d382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3800 r8:8027f5e8 r7:eba09e60 r6:854d2680 r5:847b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e48c0 INFO: task kworker/1:743:5548 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e4ccf000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e4b80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555b38c r4:8555b000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555b38c r4:854d3880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b0000 r8:854d38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3880 r8:8027f5e8 r7:eba09e60 r6:854d2700 r5:847b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac1fb0 to 0xebac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e48c0 INFO: task kworker/1:744:5550 is blocked on a mutex likely owned by task kworker/1:364:4416. Workqueue: events bpf_prog_free_deferred [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r4:00000000 r5:00001000 r4:eb607000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeba71fb0 to 0xeba71ff8) Workqueue: events bpf_prog_free_deferred 9d20: e4e07000 ecf31000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:746:5554 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:746 state:D stack:0 pid:5554 tgid:5554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebbe5d84 r8:00000002 r7:60000113 r6:ebbe5d8c r5:847b2400 r4:847b2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e4e00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb637000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555bb8c r4:8555b800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555bb8c r4:854d3a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b2400 r8:854d3a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3a00 r8:8027f5e8 r7:eba09e60 r6:854d2780 r5:847b2400 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 9fa0: 00000000 00000000 00000000 00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb8bf000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:748:5558 blocked for more than 462 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:748 state:D stack:0 pid:5558 tgid:5558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebbf5d84 r8:00000002 r7:60000113 r6:ebbf5d8c r5:847b4800 r4:847b4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d9d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb90f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555b78c r4:8555b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555b78c r4:854d3b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b4800 r8:854d3b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3b00 r8:8027f5e8 r7:eba09e60 r6:854d2880 r5:847b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf5fb0 to 0xebbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e4f80 INFO: task kworker/1:748:5558 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80000113 ffffffff [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Call trace: [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb94f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854d3b80 Exception stack(0xebbfdfb0 to 0xebbfdff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eba6b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:847b3000 r8:854d3c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e5dee000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:5564 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:751 state:D stack:0 pid:5564 tgid:5564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc0dd84 r8:00000002 r7:60000113 r6:ebc0dd8c r5:847b6000 r4:847b6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc0de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bac40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb07000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555e78c r4:8555e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555e78c r4:854d3c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b6000 r8:854d3cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3c80 r8:8027f5e8 r7:ebc05e60 r6:854d2a00 r5:847b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc0dfb0 to 0xebc0dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eba87000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xebc15fb0 to 0xebc15ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e6304000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5568 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:5568 tgid:5568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc1dd84 r8:00000002 r7:60000113 r6:ebc1dd8c r5:855e0000 r4:855e0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebaa7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555d78c r4:8555d400 r7:ddde2d80 r6:83018200 r5:8555d78c r4:854d3d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:754:5570 blocked for more than 462 seconds. r4:855e1800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555d38c r4:8555d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555d38c r4:854d3e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e1800 r8:854d3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3e00 r8:8027f5e8 r7:ebc0de60 r6:854d2b80 r5:855e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ba780 INFO: task kworker/1:754:5570 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e6304000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc2de08 r5:00001000 r4:ebac7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5574 tgid:5574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc35d84 r8:00000002 r7:60000013 r6:ebc35d8c r5:855e3c00 r4:855e3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc35e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555e38c r4:8555e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555e38c r4:854d3f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e3c00 r8:854d3f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3f00 r8:8027f5e8 r7:ebc0de60 r6:854d2c80 r5:855e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc35fb0 to 0xebc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ba840 INFO: task kworker/1:756:5574 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e685c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:855e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 r5:00001000 r4:ebae7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854d3f80 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc3dfb0 to 0xebc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ba980 INFO: task kworker/1:757:5576 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e685c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:5579 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:5579 tgid:5579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebae1d84 r8:00000002 r7:60000113 r6:ebae1d8c r5:855e4800 r4:855e4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84741480 r9:83018205 r8:855e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r5:00001000 r4:ebc71000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebae1fb0 to 0xebae1ff8) r4:854bab80 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5581 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5581 tgid:5581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc45d84 r8:00000002 r7:60000013 r6:ebc45d8c r5:855e6000 r4:855e6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc45e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bae00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb17000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555ef8c r4:8555ec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555ef8c r4:84aee080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e6000 r8:84aee0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee080 r8:8027f5e8 r7:ebae1e60 r6:854d2e00 r5:855e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xeae89d28 to 0xeae89d70) 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 r4:eae89dc0 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xeae89fb0 to 0xeae89ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:5582 tgid:5582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc49d84 r8:00000002 r7:60000113 r6:ebc49d8c r5:855e6c00 r4:855e6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc49e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a85340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85566f8c r4:85566c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85566f8c r4:854d2e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e6c00 r8:854d2eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d2e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d2e80 r8:8027f5e8 r7:ebbd5e60 r6:854d2f00 r5:855e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc49fb0 to 0xebc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c3ac0 INFO: task kworker/0:463:5582 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e73e4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:760:5584 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:760 state:D stack:0 pid:5584 tgid:5584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc55d84 r8:00000002 r7:60000113 r6:ebc55d8c r5:855e5400 r4:855e5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc55e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c3980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc51000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555f38c r4:8555f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555f38c r4:84aee100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e5400 r8:84aee12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee100 r8:8027f5e8 r7:ebae1e60 r6:854d2f80 r5:855e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc55fb0 to 0xebc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854badc0 INFO: task kworker/1:760:5584 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e73e4000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:761 state:D stack:0 pid:5586 tgid:5586 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c3dc0 r5:00001000 r4:ebc65000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555eb8c r4:8555e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555eb8c r4:84aee180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b6c00 r8:84aee1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:5589 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5589 tgid:5589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc7dd84 r8:00000002 r7:60000113 r6:ebc7dd8c r5:84908c00 r4:84908c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84908c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc7de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ace6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84908c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85560f8c r4:85560c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85560f8c r4:84aee200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84908c00 r8:84aee22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee200 r8:8027f5e8 r7:ebae1e60 r6:84ad6080 r5:84908c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc7dfb0 to 0xebc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854baf80 INFO: task kworker/1:762:5589 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e7797000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:763:5590 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:763 state:D stack:0 pid:5590 tgid:5590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc85d84 r8:00000002 r7:60000113 r6:ebc85d8c r5:84909800 r4:84909800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84909800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc85e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ace000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84909800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc81000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555ff8c r4:8555fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555ff8c r4:84aee280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84909800 r8:84aee2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee280 r8:8027f5e8 r7:ebc7de60 r6:84ad6100 r5:84909800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc85fb0 to 0xebc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ba840 INFO: task kworker/1:763:5590 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e7b73000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5593 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5593 tgid:5593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc9dd84 r8:00000002 r7:60000113 r6:ebc9dd8c r5:8490bc00 r4:8490bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8490bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc9de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ace140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8490bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc91000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555f78c r4:8555f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555f78c r4:84aee300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490bc00 r8:84aee32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee300 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ecf8f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:765 state:D stack:0 pid:5594 tgid:5594 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ace2c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8490a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e578c r4:847e5400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847e578c r4:84aee380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490a400 r8:84aee3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee380 r8:8027f5e8 r7:ebc7de60 r6:84ad6200 r5:8490a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca9fb0 to 0xebca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ace100 INFO: task kworker/1:765:5594 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e7cf7000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:5597 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:5597 tgid:5597 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebcc5d84 r8:00000002 r7:60000113 r6:ebcc5d8c r5:8490b000 r4:8490b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8490b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:8490b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:00001000 r4:ebcb1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556038c r4:85560000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8490b000 r8:84aee42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ace200 INFO: task kworker/1:766:5597 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e838c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:767:5599 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5599 tgid:5599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebccdd84 r8:00000002 r7:60000013 r6:ebccdd8c r5:84908000 r4:84908000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84908000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebccde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ace600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84908000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcbd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85560b8c r4:85560800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85560b8c r4:84aee480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84908000 r8:84aee4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee480 r8:8027f5e8 r7:ebc7de60 r6:84ad6300 r5:84908000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebccdfb0 to 0xebccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ace3c0 INFO: task kworker/1:767:5599 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e84da000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5600 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5600 tgid:5600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebcd9d84 r8:00000002 r7:60000013 r6:ebcd9d8c r5:8490c800 r4:8490c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8490c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ace740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8490c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcd1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556078c r4:85560400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556078c r4:84aee500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490c800 r8:84aee52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee500 r8:8027f5e8 r7:ebc7de60 r6:84ad6380 r5:8490c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd9fb0 to 0xebcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ace5c0 INFO: task kworker/1:768:5600 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e84da000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:769:5603 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:769 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebce9d84 r8:00000002 r7:60000013 r6:ebce9d8c r5:8490d400 r4:8490d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8490d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84acec40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8490d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd05000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85561f8c r4:85561c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85561f8c r4:84aee580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490d400 r8:84aee5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee580 r8:8027f5e8 r7:ebc7de60 r6:84ad6400 r5:8490d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce9fb0 to 0xebce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ace780 INFO: task kworker/1:769:5603 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e8818000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5604 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5604 tgid:5604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebcedd84 r8:00000002 r7:60000013 r6:ebcedd8c r5:8490ec00 r4:8490ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8490ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ace980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8490ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556138c r4:85561000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556138c r4:84aee600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490ec00 r8:84aee62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee600 r8:8027f5e8 r7:ebce9e60 r6:84ad6480 r5:8490ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcedfb0 to 0xebcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ace8c0 INFO: task kworker/1:770:5604 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e8d68000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:771:5606 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:771 state:D stack:0 pid:5606 tgid:5606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd01d84 r8:00000002 r7:60000013 r6:ebd01d8c r5:8490e000 r4:8490e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8490e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd01e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aceb80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8490e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85561b8c r4:85561800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85561b8c r4:84aee680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490e000 r8:84aee6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee680 r8:8027f5e8 r7:ebce9e60 r6:84ad6500 r5:8490e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd01fb0 to 0xebd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84acea00 INFO: task kworker/1:771:5606 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e9167000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:772 state:D stack:0 pid:5608 tgid:5608 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd09e08 r5:00001000 r4:eaf75000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85562b8c r4:85562800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85562b8c r4:84aee700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e2400 r8:84aee72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee700 r8:8027f5e8 r7:ebce9e60 r6:84ad6580 r5:855e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd09fb0 to 0xebd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84aceac0 INFO: task kworker/1:772:5608 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e9167000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5610 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc39d84 r8:00000002 r7:60000013 r6:ebc39d8c r5:8559a400 r4:8559a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84acef00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8559a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb35000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556238c r4:85562000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556238c r4:84aee780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559a400 r8:84aee7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee780 r8:8027f5e8 r7:ebd09e60 r6:84aee800 r5:8559a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e9661000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854babc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85523c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556178c r4:85561400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556178c r4:84aee880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85523c00 r8:84aee8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee880 r8:8027f5e8 r7:ebd09e60 r6:84ad6600 r5:85523c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc9fb0 to 0xebcc9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeae89d28 to 0xeae89d70) r4:82ac11e4 r4:eae89dc0 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eb9fdd84 r8:00000002 r7:60000113 r6:eb9fdd8c r5:855e8000 r4:855e8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556338c r4:85563000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556338c r4:84aee900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e8000 r8:84aee92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee900 r8:8027f5e8 r7:ebd09e60 r6:84ad6680 r5:855e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84acef80 INFO: task kworker/1:775:5616 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e9b9c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d92c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb067000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85562f8c r4:85562c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85562f8c r4:84aee980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e8c00 r8:84aee9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aee980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aee980 r8:8027f5e8 r7:eb9fde60 r6:84ad6700 r5:855e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba1fb0 to 0xebba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847d9080 INFO: task kworker/1:776:5618 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e9b9c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:777:5620 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebbadd84 r8:00000002 r7:60000113 r6:ebbadd8c r5:855e9800 r4:855e9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d94c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb355000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556278c r4:85562400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556278c r4:84aeea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e9800 r8:84aeea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aeea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeea00 r8:8027f5e8 r7:eb9fde60 r6:84ad6780 r5:855e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbadfb0 to 0xebbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847d94c0 INFO: task kworker/1:777:5620 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536bd00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd93000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85650f8c r4:85650c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85650f8c r4:84ad6800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855eb000 r8:84ad682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ad6800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6800 r8:8027f5e8 r7:ebbd5e60 r6:84ad6880 r5:855eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbcdfb0 to 0xebbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a85380 INFO: task kworker/0:464:5622 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ea4cf000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd1de08 r5:00001000 r4:eb6e7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ea6a3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/1:779:5625 blocked for more than 463 seconds. [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:855ec800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ec800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd21e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 r5:00001000 r4:eb3a9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85563b8c r4:85563800 r10:61c88647 r9:855ec800 r8:84aeeb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:780 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb429000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85563f8c r4:85563c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85563f8c r4:84aeeb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ed400 r8:84aeebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aeeb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeeb80 r8:8027f5e8 r7:ebd1de60 r6:84ad6a00 r5:855ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd25fb0 to 0xebd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847d9900 INFO: task kworker/1:780:5627 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: eab56000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:781 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb471000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564838c r4:85648000 r7:ddde2d80 r6:83018200 r5:8564838c r4:84aeec00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:782:5631 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:782 state:D stack:0 pid:5631 tgid:5631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd35d84 r8:00000002 r7:60000113 r6:ebd35d8c r5:855ee000 r4:855ee000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ee000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd35e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9840 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb649000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564878c r4:85648400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8564878c r4:84aeec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ee000 r8:84aeecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aeec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeec80 r8:8027f5e8 r7:ebd1de60 r6:84ad6b00 r5:855ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd35fb0 to 0xebd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847d9800 INFO: task kworker/1:782:5631 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: eaf86000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 r5:00001000 r4:ecf8f000 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:783:5633 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:783 state:D stack:0 pid:5633 tgid:5633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd19d84 r8:00000002 r7:60000113 r6:ebd19d8c r5:85599800 r4:85599800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85599800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd19e08 r4:00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb749000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85599800 r8:84aeed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb797000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8559bc00 r8:84aeee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aeee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeee00 r8:8027f5e8 r7:ebd19e60 r6:84aeee80 r5:8559bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd39fb0 to 0xebd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847d9cc0 INFO: task kworker/1:784:5636 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: eb2bc000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84900c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:00001000 r4:eb81d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84aeef00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847d9b80 INFO: task kworker/1:785:5637 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: eb606000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84900000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb7cb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84aeef80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847da040 Workqueue: events bpf_prog_free_deferred r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb7e3000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:788:5643 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:788 state:D stack:0 pid:5643 tgid:5643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd41d84 r8:00000002 r7:60000013 r6:ebd41d8c r5:8559c800 r4:8559c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd41e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb7fd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8564a38c r4:84820080 Exception stack(0xebd41fb0 to 0xebd41ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:789:5646 blocked for more than 463 seconds. r5:8559d400 r4:82918884 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb83b000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84820180 r8:8027f5e8 r7:ebd45e60 r6:84820200 r5:8559d400 r4:853690c0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeae89fb0 to 0xeae89ff8) Not tainted 6.15.0-syzkaller #0 r4:8559e000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb9f7000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ebfca000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5649 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5649 tgid:5649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd61d84 r8:00000002 r7:60000113 r6:ebd61d8c r5:8559ec00 r4:8559ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd61e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85369480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8559ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb853000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564af8c r4:8564ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8564af8c r4:84820380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559ec00 r8:848203ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84820380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84820380 r8:8027f5e8 r7:ebbb9e60 r6:84820400 r5:8559ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd61fb0 to 0xebd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb9d5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85598c00 r8:848204ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ec8b6000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:5653 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:793 state:D stack:0 pid:5653 tgid:5653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd6dd84 r8:00000002 r7:60000013 r6:ebd6dd8c r5:85598000 r4:85598000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85598000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd6de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84750040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85598000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565038c r4:85650000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565038c r4:84820580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85598000 r8:848205ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84820580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84820580 r8:8027f5e8 r7:ebbb9e60 r6:84820600 r5:85598000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd6dfb0 to 0xebd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85369640 Call trace: 9d20: ec8b6000 ecf31000 00000001 80239b98 7f37f000 00000001 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:794 state:D stack:0 pid:5655 tgid:5655 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd71e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb47000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564bb8c r4:8564b800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8564bb8c r4:84820680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85593c00 r8:848206ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84820680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84820680 r8:8027f5e8 r7:ebd6de60 r6:84820700 r5:85593c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd71fb0 to 0xebd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85369800 INFO: task kworker/1:794:5655 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: eccf5000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85610c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd75e08 r5:00001000 r4:ebb91000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8564bf8c r4:84820780 Exception stack(0xebd75fb0 to 0xebd75ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:796 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebbc1000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xebd69fb0 to 0xebd69ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: ecf01000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5661 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5661 tgid:5661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd7dd84 r8:00000002 r7:60000113 r6:ebd7dd8c r5:85613000 r4:85613000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85613000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd7de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847507c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85613000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdaf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565178c r4:85651400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565178c r4:84820980 r10:61c88647 r9:85613000 r8:848209ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85369e40 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:82ac11e4 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:798 state:D stack:0 pid:5663 tgid:5663 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd87000 r5:85650b8c r4:85650800 r10:61c88647 r9:85613c00 r8:84820aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84750180 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5665 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd91d84 r8:00000002 r7:60000113 r6:ebd91d8c r5:85611800 r4:85611800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85611800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd91e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84750680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85611800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd9f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565078c r4:85650400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565078c r4:84820b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85611800 r8:84820bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84820b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84820b80 r8:8027f5e8 r7:ebd7de60 r6:84820c00 r5:85611800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd91fb0 to 0xebd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84750340 INFO: task kworker/1:799:5665 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 7fa96000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:ebd79d84 r8:00000002 r7:60000013 r6:ebd79d8c r5:84903000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb579000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855cc78c r4:855cc400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cc78c r4:84ad6d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84903000 r8:84ad6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ad6d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6d00 r8:8027f5e8 r7:ebbd5e60 r6:84ad6d80 r5:84903000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd79fb0 to 0xebd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8536bf80 INFO: task kworker/0:465:5667 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 7fa96000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:00000001 r4:84bf9700 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdade08 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474a040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84904800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdff000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85651f8c r4:85651c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85651f8c r4:84820c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84904800 r8:84820cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84820c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84820c80 r8:8027f5e8 r7:ebd7de60 r6:84ad6e00 r5:84904800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdadfb0 to 0xebdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847507c0 INFO: task kworker/1:800:5669 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 7fc53000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebdb7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85651b8c r4:84820d00 r10:00000000 r9:84820d00 r8:8027f5e8 r7:ebdade60 r6:84ad6e80 r5:84905400 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebdc3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565138c r4:85651000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565138c r4:84820d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84906000 r8:84820dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84820d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84820d80 r8:8027f5e8 r7:ebdade60 r6:84ad6f00 r5:84906000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdcdfb0 to 0xebdcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84750340 INFO: task kworker/1:802:5674 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8015c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:803:5675 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5675 tgid:5675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebdd9d84 r8:00000002 r7:60000013 r6:ebdd9d8c r5:84906c00 r4:84906c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdcf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:804 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd9dd84 r8:00000002 r7:60000013 r6:ebd9dd8c r5:85612400 r4:85612400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85612400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd9de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84750d00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebddb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565278c r4:85652400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565278c r4:84820e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85612400 r8:84820eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84820e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84820e80 r8:8027f5e8 r7:ebdade60 r6:84820f00 r5:85612400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd9dfb0 to 0xebd9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84750340 INFO: task kworker/1:804:5677 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 803c0000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebde3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85652b8c r4:85652800 r10:61c88647 r9:85616c00 r8:84820fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:806:5681 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:806 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebdf1d84 r8:00000002 r7:60000013 r6:ebdf1d8c r5:85616000 r4:85616000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85616000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85369e00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85616000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdf3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85652f8c r4:85652c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85652f8c r4:8474b080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85616000 r8:8474b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474b080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b080 r8:8027f5e8 r7:ebdade60 r6:8474b100 r5:85616000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdf1fb0 to 0xebdf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84750d40 INFO: task kworker/1:806:5681 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 80b19000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:807 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebdedd84 r8:00000002 r7:60000113 r6:ebdedd8c r5:85615400 r4:85615400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85615400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474a140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85615400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe0b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565338c r4:85653000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565338c r4:8474b180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85615400 r8:8474b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474b180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b180 r8:8027f5e8 r7:ebdade60 r6:8474b200 r5:85615400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdedfb0 to 0xebdedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474a280 INFO: task kworker/1:807:5684 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 80b19000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85a35f8c r4:85a35c00 r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:808 state:D stack:0 pid:5686 tgid:5686 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:85614800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 r5:00001000 r4:ebe47000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8564b78c r4:8474b280 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe15d84 r8:00000002 r7:60000013 r6:ebe15d8c r5:8559b000 r4:8559b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe15e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474a400 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8559b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe17000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653b8c r4:85653800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85653b8c r4:8474b380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559b000 r8:8474b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474b380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b380 r8:8027f5e8 r7:ebdfde60 r6:8474b400 r5:8559b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe15fb0 to 0xebe15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474a3c0 INFO: task kworker/1:809:5688 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 80e07000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:810 state:D stack:0 pid:5689 tgid:5689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe09d84 r8:00000002 r7:60000013 r6:ebe09d8c r5:85620000 r4:85620000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85620000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe09e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474a600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85620000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe23000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653f8c r4:85653c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85653f8c r4:8474b480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85620000 r8:8474b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474b480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b480 r8:8027f5e8 r7:ebdfde60 r6:8474b500 r5:85620000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe09fb0 to 0xebe09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474a2c0 INFO: task kworker/1:810:5689 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 81283000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:811 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe21e08 r5:00001000 r4:ebe3b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565378c r4:85653400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8474b580 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r5:85a35f8c r4:85a35c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:848b5900 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:84bf9700 INFO: task kworker/0:466:5694 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:5694 tgid:5694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe39d84 r8:00000002 r7:60000113 r6:ebe39d8c r5:85622400 r4:85622400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85622400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe39e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e8880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85622400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe55000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556778c r4:85567400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556778c r4:84991000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85622400 r8:8499102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84991000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991000 r8:8027f5e8 r7:ebd79e60 r6:8474b680 r5:85622400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe39fb0 to 0xebe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85362440 INFO: task kworker/0:466:5694 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 81733000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:812:5695 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:812 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85623000 r5:85623000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe45e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474ab00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85623000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb11000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565c38c r4:8565c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565c38c r4:8474b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85623000 r8:8474b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b700 r8:8027f5e8 r7:ebdfde60 r6:8474b780 r5:85623000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe45fb0 to 0xebe45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474a680 INFO: task kworker/1:812:5695 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 81733000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:813:5697 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:813 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe2dd84 r8:00000002 r7:60000113 r6:ebe2dd8c r5:85623c00 r4:85623c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85623c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe2de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474ac00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85623c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe53000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565c78c r4:8565c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565c78c r4:8474b800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85623c00 r8:8474b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474b800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b800 r8:8027f5e8 r7:ebe45e60 r6:8474b880 r5:85623c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe2dfb0 to 0xebe2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474aa40 INFO: task kworker/1:813:5697 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 81733000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:814:5700 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:814 state:D stack:0 pid:5700 tgid:5700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eba91d84 r8:00000002 r7:60000013 r6:eba91d8c r5:85625400 r4:85625400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85625400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474ad80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85625400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565cb8c r4:8565c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565cb8c r4:8474b900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85625400 r8:8474b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474b900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b900 r8:8027f5e8 r7:ebe45e60 r6:8474b980 r5:85625400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba91fb0 to 0xeba91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474a980 INFO: task kworker/1:814:5700 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 81b21000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:5702 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:5702 tgid:5702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebaadd84 r8:00000002 r7:60000113 r6:ebaadd8c r5:85626000 r4:85626000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85626000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ec040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85626000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r5:00001000 r4:eb509000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8565d78c r4:8474ba00 Exception stack(0xebaadfb0 to 0xebaadff8) r4:8474ad00 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:816:5703 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:816 state:D stack:0 pid:5703 tgid:5703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebbe1d84 r8:00000002 r7:60000113 r6:ebbe1d8c r5:85626c00 r4:85626c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85626c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84750400 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85626c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565cf8c r4:8565cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565cf8c r4:8474bb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85626c00 r8:8474bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474bb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bb00 r8:8027f5e8 r7:ebaade60 r6:8474bb80 r5:85626c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe1fb0 to 0xebbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474ad00 INFO: task kworker/1:816:5703 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 82006000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:5705 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:817 state:D stack:0 pid:5705 tgid:5705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918888 r9:ebc21d84 r8:00000002 r7:60000113 r6:ebc21d8c r5:85624800 r4:00000000 r4:00000000 r5:00001000 r4:eb951000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565eb8c r4:8565e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85624800 r8:8474bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:818:5708 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:818 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc4dd84 r8:00000002 r7:60000013 r6:ebc4dd8c r5:85628000 r4:85628000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85628000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc4de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ec240 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85628000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb581000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565d38c r4:8565d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565d38c r4:8474bd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628000 r8:8474bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474bd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bd00 r8:8027f5e8 r7:ebc21e60 r6:8474bd80 r5:85628000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc4dfb0 to 0xebc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ec200 INFO: task kworker/1:818:5708 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 82879000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 r5:00001000 r4:ed35d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:84bf9700 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe51e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565df8c r4:8565dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565df8c r4:8474be00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628c00 r8:8474be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8474be00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474be00 r8:8027f5e8 r7:ebc21e60 r6:8474be80 r5:85628c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe51fb0 to 0xebe51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ec400 INFO: task kworker/1:819:5709 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 82ab0000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb613000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85629800 r8:8474bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 82bb1000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:821:5713 blocked for more than 464 seconds. r4:8562a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8565e38c r4:84742000 Exception stack(0xebc69fb0 to 0xebc69ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:8562b000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565e78c r4:8565e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565e78c r4:84742100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562b000 r8:8474212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742100 r8:8027f5e8 r7:ebc21e60 r6:84742180 r5:8562b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc6dfb0 to 0xebc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ec800 INFO: task kworker/1:822:5716 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 83374000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:823:5717 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:823 state:D stack:0 pid:5717 tgid:5717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebc89d84 r8:00000002 r7:60000113 r6:ebc89d8c r5:8562bc00 r4:8562bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc89e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ece40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565f78c r4:8565f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565f78c r4:84742200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562bc00 r8:8474222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742200 r8:8027f5e8 r7:ebc21e60 r6:84742280 r5:8562bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc89fb0 to 0xebc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ec800 INFO: task kworker/1:823:5717 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:eaeb9dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ecd40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562c800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565f38c r4:8565f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565f38c r4:84742300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562c800 r8:8474232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742300 r8:8027f5e8 r7:ebc89e60 r6:84742380 r5:8562c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842ecb80 INFO: task kworker/1:824:5719 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 83374000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc8de08 r9:83018205 r8:8562d400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r5:00001000 r4:eba95000 r7:ddde2d80 r6:83018200 r5:8565fb8c r4:84742400 Exception stack(0xebc8dfb0 to 0xebc8dff8) r4:842ecf80 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 838b7000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:5723 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:5723 tgid:5723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc95e08 r5:00001000 r4:ebacb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565ff8c r4:8565fc00 r7:ddde2d80 r6:83018200 r5:8565ff8c r4:84742500 Exception stack(0xebc95fb0 to 0xebc95ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 INFO: task kworker/1:827:5726 blocked for more than 464 seconds. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565ef8c r4:8565ec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565ef8c r4:84742600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562ec00 r8:8474262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742600 r8:8027f5e8 r7:ebc95e60 r6:84742680 r5:8562ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcadfb0 to 0xebcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8536bfc0 INFO: task kworker/1:827:5726 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 83f14000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:828 state:D stack:0 pid:5728 tgid:5728 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebbdd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566cf8c r4:8566cc00 r7:ddde2d80 r6:83018200 r5:8566cf8c r4:84742700 Exception stack(0xebe5dfb0 to 0xebe5dff8) r4:84823140 Workqueue: events bpf_prog_free_deferred r4:00000000 9d20: 83f14000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918888 r9:ebcb5d84 r8:00000002 r7:60000113 r6:ebcb5d8c r5:85630c00 r4:85630c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85630c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823240 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85630c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566c78c r4:8566c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566c78c r4:84742880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85630c00 r8:847428ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742880 r8:8027f5e8 r7:ebe5de60 r6:84742900 r5:85630c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb5fb0 to 0xebcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823380 INFO: task kworker/1:829:5729 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 84230000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:82918888 r9:ebe61d84 r8:00000002 r7:60000113 r6:ebe61d8c r5:85631800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe61e08 r9:83018205 r8:85631800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 r5:00001000 r4:ebaf3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566c38c r4:8566c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566c38c r4:84742800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85631800 r8:8474282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742800 r8:8027f5e8 r7:ebe5de60 r6:84742980 r5:85631800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe61fb0 to 0xebe61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823400 INFO: task kworker/1:830:5732 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 84230000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:5733 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:5733 tgid:5733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918888 r9:ebe65d84 r8:00000002 r7:60000113 r6:ebe65d8c r5:85632400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe65e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823400 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566cb8c r4:8566c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566cb8c r4:84742a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85632400 r8:84742a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742a00 r8:8027f5e8 r7:ebe5de60 r6:84742a80 r5:85632400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe65fb0 to 0xebe65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823600 INFO: task kworker/1:831:5733 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8479e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5735 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5735 tgid:5735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ebbf1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566d38c r4:8566d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566d38c r4:84742b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85633000 r8:84742b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742b00 r8:8027f5e8 r7:ebe5de60 r6:84742b80 r5:85633000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe69fb0 to 0xebe69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823580 INFO: task kworker/1:832:5735 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8479e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:833:5738 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe6de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823a00 r5:00001000 r4:ebc01000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566db8c r4:8566d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566db8c r4:84742c00 r10:61c88647 r9:85633c00 r8:84742c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r5:80000113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:00000000 r5:00001000 r4:ed35d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:834:5739 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:5739 tgid:5739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe71d84 r8:00000002 r7:60000013 r6:ebe71d8c r5:85634800 r4:85634800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85634800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe71e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85634800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc11000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566d78c r4:8566d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566d78c r4:84742d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85634800 r8:84742d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742d00 r8:8027f5e8 r7:ebe6de60 r6:84742d80 r5:85634800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe71fb0 to 0xebe71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823580 INFO: task kworker/1:834:5739 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 84a61000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5742 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:5742 tgid:5742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe75d84 r8:00000002 r7:60000113 r6:ebe75d8c r5:85635400 r4:85635400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85635400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85635400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc63000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566e38c r4:8566e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566e38c r4:84742e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85635400 r8:84742e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742e00 r8:8027f5e8 r7:ebe71e60 r6:84742e80 r5:85635400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe75fb0 to 0xebe75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823b40 INFO: task kworker/1:835:5742 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 84a61000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:5743 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:5743 tgid:5743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe81d84 r8:00000002 r7:60000113 r6:ebe81d8c r5:84902400 r4:84902400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84902400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe81e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823c40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84902400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc29000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566df8c r4:8566dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566df8c r4:84742f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84902400 r8:84742f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742f00 r8:8027f5e8 r7:ebe75e60 r6:84991080 r5:84902400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe81fb0 to 0xebe81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823d80 INFO: task kworker/1:836:5743 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 84e90000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:5745 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:5745 tgid:5745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe89d84 r8:00000002 r7:60000013 r6:ebe89d8c r5:84903c00 r4:84903c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84903c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe89e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823e80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84903c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc41000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566e78c r4:8566e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566e78c r4:84742f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84903c00 r8:84742fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84742f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742f80 r8:8027f5e8 r7:ebe75e60 r6:84991100 r5:84903c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe89fb0 to 0xebe89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823d40 INFO: task kworker/1:837:5745 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8527f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:5747 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:5747 tgid:5747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe91d84 r8:00000002 r7:60000013 r6:ebe91d8c r5:85621800 r4:85621800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85621800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe91e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85621800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc9f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566f38c r4:8566f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566f38c r4:854dd000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85621800 r8:854dd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd000 r8:8027f5e8 r7:ebe75e60 r6:84991180 r5:85621800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe91fb0 to 0xebe91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823e40 INFO: task kworker/1:838:5747 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8527f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc7f000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566eb8c r4:8566e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566eb8c r4:854dd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a10c00 r8:854dd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd080 r8:8027f5e8 r7:ebe91e60 r6:84991200 r5:84a10c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe99fb0 to 0xebe99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85362680 INFO: task kworker/1:839:5749 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8527f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:840:5751 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:840 state:D stack:0 pid:5751 tgid:5751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebea1d84 r8:00000002 r7:60000113 r6:ebea1d8c r5:84a10000 r4:84a10000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a10000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebea1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521da40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a10000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebecb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85670f8c r4:85670c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85670f8c r4:854dd100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a10000 r8:854dd12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd100 r8:8027f5e8 r7:ebe91e60 r6:84991280 r5:84a10000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebea1fb0 to 0xebea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84823f80 INFO: task kworker/1:840:5751 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 Exception stack(0xeaeb9d28 to 0xeaeb9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84a12400 r4:82918884 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ebcc1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:842:5756 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:842 state:D stack:0 pid:5756 tgid:5756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebea5d84 r8:00000002 r7:60000013 r6:ebea5d8c r5:84a13000 r4:84a13000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a13000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebea5e08 r4:00000000 r4:00000000 r5:00001000 r4:ebcdb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566f78c r4:8566f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566f78c r4:854dd200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a13000 r8:854dd22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd200 r8:8027f5e8 r7:ebea1e60 r6:84991380 r5:84a13000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebea5fb0 to 0xebea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:80000113 r4:80239bb0 r4:eaeb9dc0 r5:85a35f8c r4:85a35c00 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebce5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8566fb8c r4:854dd280 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:00000001 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:844:5761 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:844 state:D stack:0 pid:5761 tgid:5761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebeb5d84 r8:00000002 r7:60000113 r6:ebeb5d8c r5:84a16000 r4:84a16000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a16000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeb5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521d600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a16000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566ff8c r4:8566fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566ff8c r4:854dd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a16000 r8:854dd32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd300 r8:8027f5e8 r7:ebea1e60 r6:84991480 r5:84a16000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebeb5fb0 to 0xebeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521d680 INFO: task kworker/1:844:5761 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 85f9d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84a14800 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebd0b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8567078c r4:854dd380 r10:61c88647 r9:84a14800 r8:854dd3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521d580 INFO: task kworker/1:845:5763 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 85f9d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:846:5764 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:846 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebec5d84 r8:00000002 r7:60000113 r6:ebec5d8c r5:84a15400 r4:84a15400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a15400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebec5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521d8c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a15400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd15000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85670b8c r4:85670800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85670b8c r4:854dd400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a15400 r8:854dd42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd400 r8:8027f5e8 r7:ebea1e60 r6:84991580 r5:84a15400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebec5fb0 to 0xebec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521d7c0 INFO: task kworker/1:846:5764 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8678f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:847:5767 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:847 state:D stack:0 pid:5767 tgid:5767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebed9d84 r8:00000002 r7:60000013 r6:ebed9d8c r5:84b40000 r4:84b40000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b40000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521df00 r5:00001000 r4:ebf0f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85671f8c r4:85671c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b40000 r8:854dd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xebed9fb0 to 0xebed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521d900 INFO: task kworker/1:847:5767 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8678f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:848:5768 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:848 state:D stack:0 pid:5768 tgid:5768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84b40c00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebedf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567138c r4:85671000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854dd500 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000113 r4:80239bb0 r4:eaeb9dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b43000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521dd00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b43000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebeeb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567038c r4:85670000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567038c r4:854dd580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b43000 r8:854dd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd580 r8:8027f5e8 r7:ebed9e60 r6:84991700 r5:84b43000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebef9fb0 to 0xebef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521db00 INFO: task kworker/1:849:5771 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 868c6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:5772 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:5772 tgid:5772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebefdd84 r8:00000002 r7:60000113 r6:ebefdd8c r5:84b41800 r4:84b41800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b41800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebefde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521de40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b41800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebeff000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85671b8c r4:85671800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85671b8c r4:854dd600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b41800 r8:854dd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd600 r8:8027f5e8 r7:ebed9e60 r6:84991780 r5:84b41800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebefdfb0 to 0xebefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521d680 INFO: task kworker/1:850:5772 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 86bd4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb381000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 871c4000 ed2f3000 00000001 80239b98 7f383000 00000001 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:5776 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebd8dd84 r8:00000002 r7:60000113 r6:ebd8dd8c r5:84b43c00 r4:84b43c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b43c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823f80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb01000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567178c r4:85671400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567178c r4:854dd700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b43c00 r8:854dd72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd700 r8:8027f5e8 r7:ebf19e60 r6:84991880 r5:84b43c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd8dfb0 to 0xebd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521df40 INFO: task kworker/1:852:5776 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 871c4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a35f8c r4:85a35c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:848b5900 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:84bf9700 INFO: task kworker/1:853:5778 blocked for more than 464 seconds. Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:e0623000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567278c r4:85672400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567278c r4:854dd780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b46000 r8:854dd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd780 r8:8027f5e8 r7:ebf19e60 r6:84991900 r5:84b46000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebda5fb0 to 0xebda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521d140 INFO: task kworker/1:853:5778 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 872a1000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:5780 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebdc9d84 r8:00000002 r7:60000013 r6:ebdc9d8c r5:84b45400 r4:84b45400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b45400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc9e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d50c0 r5:00001000 r4:eae6d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8567238c r4:854dd800 Exception stack(0xebdc9fb0 to 0xebdc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d5280 INFO: task kworker/1:854:5780 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 87775000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:855:5782 blocked for more than 464 seconds. r10:82918888 r9:ebde9d84 r8:00000002 r7:60000013 r6:ebde9d8c r5:84b44800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebde9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5300 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b44800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb041000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85672f8c r4:85672c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85672f8c r4:854dd880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b44800 r8:854dd8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dd880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dd880 r8:8027f5e8 r7:ebf19e60 r6:84991a00 r5:84b44800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebde9fb0 to 0xebde9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d5440 INFO: task kworker/1:855:5782 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 87775000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 r5:85a35f8c r4:85a35c00 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:856:5784 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:856 state:D stack:0 pid:5784 tgid:5784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe05d84 r8:00000002 r7:60000113 r6:ebe05d8c r5:84a11800 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84a11800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:00001000 r4:eb291000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8567338c r4:854dd900 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:5786 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:5786 tgid:5786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe1dd84 r8:00000002 r7:60000113 r6:ebe1dd8c r5:855ebc00 r4:855ebc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ebc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe1de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695dc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd5d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567778c r4:85677400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567778c r4:854dd980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xebe1dfb0 to 0xebe1dff8) r4:854d5480 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:856b0000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb409000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8567378c r4:854dda00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 87fd4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:5790 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:5790 tgid:5790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe4dd84 r8:00000002 r7:60000013 r6:ebe4dd8c r5:856b1800 r4:856b1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe4de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb485000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85673f8c r4:85673c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85673f8c r4:854dda80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b1800 r8:854ddaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dda80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dda80 r8:8027f5e8 r7:ebe1de60 r6:84991c00 r5:856b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe4dfb0 to 0xebe4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:eaeb9dc0 r5:00001000 r4:ed35d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:856b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:00001000 r4:eb65f000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854ddb00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf21fb0 to 0xebf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d5740 INFO: task kworker/1:860:5792 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 881ba000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:861:5794 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:861 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebf29d84 r8:00000002 r7:60000013 r6:ebf29d8c r5:856b2400 r4:856b2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf29e08 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb747000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8567478c r4:854ddb80 Exception stack(0xebf29fb0 to 0xebf29ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:862:5796 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:862 state:D stack:0 pid:5796 tgid:5796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe9dd84 r8:00000002 r7:60000113 r6:ebe9dd8c r5:85636000 r4:85636000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85636000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe9de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5b80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85636000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567438c r4:85674000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567438c r4:854ddc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85636000 r8:854ddc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854ddc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ddc00 r8:8027f5e8 r7:ebe1de60 r6:854ddc80 r5:85636000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe9dfb0 to 0xebe9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d59c0 INFO: task kworker/1:862:5796 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 88ac4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 r4:eaeb9dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 INFO: task kworker/1:863:5798 blocked for more than 465 seconds. r10:82918888 r9:ebf2dd84 r8:00000002 r7:60000013 r6:ebf2dd8c r5:85636c00 r4:85636c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85636c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf2de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85636c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85674b8c r4:85674800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85674b8c r4:854ddd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85636c00 r8:854ddd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854ddd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ddd00 r8:8027f5e8 r7:ebe1de60 r6:854ddd80 r5:85636c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf2dfb0 to 0xebf2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d5c80 INFO: task kworker/1:863:5798 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 88d9c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:ebf31d84 r8:00000002 r7:60000013 r6:ebf31d8c r5:85638000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5e00 r5:00001000 r4:eb7fb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d5f00 INFO: task kworker/1:864:5801 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 88d9c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:865:5803 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:865 state:D stack:0 pid:5803 tgid:5803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebf35d84 r8:00000002 r7:60000013 r6:ebf35d8c r5:85638c00 r4:85638c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85638c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf35e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb823000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567538c r4:85675000 r7:ddde2d80 r6:83018200 r5:8567538c r4:854ddf00 Exception stack(0xebf35fb0 to 0xebf35ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:866:5805 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:866 state:D stack:0 pid:5805 tgid:5805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebf39d84 r8:00000002 r7:60000013 r6:ebf39d8c r5:85639800 r4:85639800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85639800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf39e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521df40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85639800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567578c r4:85675400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567578c r4:85692000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85639800 r8:8569202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85692000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85692000 r8:8027f5e8 r7:ebe1de60 r6:85692080 r5:85639800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf39fb0 to 0xebf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d5e40 INFO: task kworker/1:866:5805 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 89169000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:84bf9700 r10:82918888 r9:ebf41d84 r8:00000002 r7:60000113 r6:ebf41d8c r5:8563b000 r5:00001000 r4:eb9c9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85675b8c r4:85675800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85675b8c r4:85692100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563b000 r8:8569212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85692100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85692100 r8:8027f5e8 r7:ebe1de60 r6:85692180 r5:8563b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf41fb0 to 0xebf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85695100 INFO: task kworker/1:867:5807 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:eaeb9dc0 r5:00001000 r4:ed35d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:868 state:D stack:0 pid:5808 tgid:5808 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe79e08 r5:00001000 r4:eb9f9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: 89aba000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:eaeb9dc0 r5:00001000 r4:ed35d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6b000 r5:8567678c r4:85676400 r10:61c88647 r9:8563c800 r8:8569232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85695140 INFO: task kworker/1:869:5810 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8a0ef000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:870:5812 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:870 state:D stack:0 pid:5812 tgid:5812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebf4dd84 r8:00000002 r7:60000013 r6:ebf4dd8c r5:8563e000 r4:8563e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf4de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8563e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r5:00001000 r4:ebb9d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85676b8c r4:85676800 r7:ddde2d80 r6:83018200 r5:85676b8c r4:85692400 Exception stack(0xebf4dfb0 to 0xebf4dff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r4:00000000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:871:5815 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:871 state:D stack:0 pid:5815 tgid:5815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebf55d84 r8:00000002 r7:60000013 r6:ebf55d8c r5:8563ec00 r4:8563ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf55e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8563ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd29000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85676f8c r4:85676c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85676f8c r4:85692500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563ec00 r8:8569252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85692500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85692500 r8:8027f5e8 r7:ebe1de60 r6:85692580 r5:8563ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf55fb0 to 0xebf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856957c0 INFO: task kworker/1:871:5815 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 INFO: task kworker/1:872:5817 blocked for more than 465 seconds. r4:8563a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf5de08 r5:00001000 r4:ebd3d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8567738c r4:85692600 Exception stack(0xebf5dfb0 to 0xebf5dff8) r4:85695700 Call trace: 9d20: 8a57f000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:873:5819 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:873 state:D stack:0 pid:5819 tgid:5819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebf61d84 r8:00000002 r7:60000113 r6:ebf61d8c r5:85640c00 r4:85640c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85640c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf61e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856958c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85640c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 r5:00001000 r4:ebd95000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85675f8c r4:85675c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85675f8c r4:85692700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85640c00 r8:8569272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85692700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85692700 r8:8027f5e8 r7:ebe1de60 r6:85692780 r5:85640c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf61fb0 to 0xebf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856958c0 INFO: task kworker/1:873:5819 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8a57f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:874:5822 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:874 state:D stack:0 pid:5822 tgid:5822 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf51e08 r9:83018205 r8:85641800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r5:00001000 r4:ebdb5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85677b8c r4:85692800 Exception stack(0xebf51fb0 to 0xebf51ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 task:kworker/1:875 state:D stack:0 pid:5824 tgid:5824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:85642400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:00001000 r4:ebddd000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85692900 r8:8027f5e8 r7:ebf51e60 r6:85692980 r5:85642400 r4:85695e40 Call trace: r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8ad33000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:876:5825 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:876 state:D stack:0 pid:5825 tgid:5825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebf49d84 r8:00000002 r7:60000113 r6:ebf49d8c r5:85643000 r4:85643000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85643000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf49e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569acc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85643000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebfa7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85681b8c r4:85681800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85681b8c r4:85692a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85643000 r8:85692a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85692a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85692a00 r8:8027f5e8 r7:ebf65e60 r6:85692a80 r5:85643000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf49fb0 to 0xebf49ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:8569a180 Call trace: 9d20: 8b014000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:877 state:D stack:0 pid:5828 tgid:5828 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf71e08 r5:00001000 r4:ebdf5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:878:5829 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:878 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebf75d84 r8:00000002 r7:60000013 r6:ebf75d8c r5:85645400 r4:85645400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85645400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569a4c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85645400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe25000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85680f8c r4:85680c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85680f8c r4:85692c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85645400 r8:85692c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85692c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85692c00 r8:8027f5e8 r7:ebf49e60 r6:85692c80 r5:85645400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf75fb0 to 0xebf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569a600 INFO: task kworker/1:878:5829 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebfe1000 r5:85567f8c r4:85567c00 r10:61c88647 r9:85646000 r8:84991dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e8940 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:879:5833 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:879 state:D stack:0 pid:5833 tgid:5833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebf85d84 r8:00000002 r7:60000113 r6:ebf85d8c r5:85646c00 r4:85646c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85646c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf85e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569a8c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85646c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf81000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85680b8c r4:85680800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85680b8c r4:85692d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85646c00 r8:85692dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85692d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85692d80 r8:8027f5e8 r7:ebf49e60 r6:85692e00 r5:85646c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf85fb0 to 0xebf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569a780 INFO: task kworker/1:879:5833 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8bb35000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85640000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85640000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf79e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569a9c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85640000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf8d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8568138c r4:85681000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568138c r4:85692e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85640000 r8:85692eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85692e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85692e80 r8:8027f5e8 r7:ebf49e60 r6:85692f00 r5:85640000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf79fb0 to 0xebf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569a780 INFO: task kworker/1:880:5835 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8bde7000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569ab40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85644800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf9b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8568178c r4:85681400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568178c r4:85692f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85644800 r8:85692fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85692f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85692f80 r8:8027f5e8 r7:ebf49e60 r6:856a2000 r5:85644800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf6dfb0 to 0xebf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569abc0 INFO: task kworker/1:881:5838 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8c032000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bf9700 task:kworker/1:882 state:D stack:0 pid:5840 tgid:5840 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ebfcd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85681f8c r4:85681c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebfb5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8568238c r4:856a2180 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8c7da000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:884:5843 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:884 state:D stack:0 pid:5843 tgid:5843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebfb1d84 r8:00000002 r7:60000013 r6:ebfb1d8c r5:856e8c00 r4:856e8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfb1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569e000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebfc5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8568278c r4:85682400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568278c r4:856a2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e8c00 r8:856a22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856a2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a2280 r8:8027f5e8 r7:ebfa5e60 r6:856a2300 r5:856e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebfb1fb0 to 0xebfb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569ad40 INFO: task kworker/1:884:5843 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8c7da000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfb4d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8cc40000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:886:5848 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:886 state:D stack:0 pid:5848 tgid:5848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebfedd84 r8:00000002 r7:60000013 r6:ebfedd8c r5:856ebc00 r4:856ebc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ebc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569e5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebff1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85682b8c r4:85682800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85682b8c r4:856a2480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ebc00 r8:856a24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856a2480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a2480 r8:8027f5e8 r7:ebfd5e60 r6:856a2500 r5:856ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebfedfb0 to 0xebfedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569e380 INFO: task kworker/1:886:5848 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8cfba000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:856e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:00001000 r4:eb4d5000 r5:847e4f8c r4:847e4c00 r7:dddced80 r6:83018000 r5:847e4f8c r4:84991e00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Not tainted 6.15.0-syzkaller #0 r4:856ec800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ec800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569ef00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85677f8c r4:85677c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85677f8c r4:856a2600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ec800 r8:856a262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856a2600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a2600 r8:8027f5e8 r7:ebfd5e60 r6:856a2680 r5:856ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebeadfb0 to 0xebeadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569e340 INFO: task kworker/1:887:5852 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8d1e4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848b5900 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8568338c r4:85683000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568338c r4:856a2700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ee000 r8:856a272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856a2700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a2700 r8:8027f5e8 r7:ebeade60 r6:856a2780 r5:856ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebed1fb0 to 0xebed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569e900 INFO: task kworker/1:888:5854 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8d1e4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb627000 r7:ddde2d80 r6:83018200 r5:8568378c r4:856a2800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8d973000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:5860 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:5860 tgid:5860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebfc1d84 r8:00000002 r7:60000113 r6:ebfc1d8c r5:856ed400 r4:856ed400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ed400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfc1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cdf40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:855ce78c r4:84991e80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8d973000 ed2f3000 00000001 80239b98 7f383000 00000001 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:5861 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:5861 tgid:5861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebef1d84 r8:00000002 r7:60000113 r6:ebef1d8c r5:856eec00 r4:856eec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856eec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a8500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ccb8c r4:855cc800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ccb8c r4:84991f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856eec00 r8:84991f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84991f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991f00 r8:8027f5e8 r7:ebfc1e60 r6:856a2980 r5:856eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebef1fb0 to 0xebef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:856a8000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:890:5862 blocked for more than 465 seconds. r4:856f0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebffde08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85683b8c r4:856a2a00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8dc17000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:eaeb9dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:891:5864 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:891 state:D stack:0 pid:5864 tgid:5864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebfe9d84 r8:00000002 r7:60000013 r6:ebfe9d8c r5:856f0c00 r4:856f0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfe9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7c40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc31000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8572eb8c r4:8572e800 r7:ddde2d80 r6:83018200 r5:8572eb8c r4:856a2b00 r4:8569e900 9d20: 8df9b000 ed2f3000 00000001 80239b98 7f383000 00000001 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:892:5866 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:892 state:D stack:0 pid:5866 tgid:5866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec80dd84 r8:00000002 r7:60000113 r6:ec80dd8c r5:856b5400 r4:856b5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec80de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba73000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8572c38c r4:8572c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572c38c r4:856a2c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b5400 r8:856a2c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856a2c00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:893:5868 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:893 state:D stack:0 pid:5868 tgid:5868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec815d84 r8:00000002 r7:60000113 r6:ec815d8c r5:856b6000 r4:856b6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba93000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8572c78c r4:8572c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572c78c r4:856a2c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b6000 r8:856a2cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856a2c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a2c80 r8:8027f5e8 r7:ebfe9e60 r6:854d7000 r5:856b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec815fb0 to 0xec815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a7140 INFO: task kworker/1:893:5868 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8e5ca000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab7000 r5:8572cf8c r4:8572cc00 r4:856a2d00 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a70c0 INFO: task kworker/1:894:5870 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8e88a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:895:5872 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:895 state:D stack:0 pid:5872 tgid:5872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec825d84 r8:00000002 r7:60000013 r6:ec825d8c r5:856b4800 r4:856b4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8572d38c r4:8572d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572d38c r4:856a2d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b4800 r8:856a2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856a2d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a2d80 r8:8027f5e8 r7:ebfe9e60 r6:854d7100 r5:856b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec825fb0 to 0xec825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a7340 INFO: task kworker/1:895:5872 is blocked on a mutex likely owned by task kworker/1:370:4428. [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85a35f8c r4:85a35c00 r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebaed000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:897 state:D stack:0 pid:5876 tgid:5876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec845d84 r8:00000002 r7:60000113 r6:ec845d8c r5:84a16c00 r4:84a16c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a16c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec845e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8572db8c r4:8572d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572db8c r4:856a2e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a16c00 r8:856a2eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856a2e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a2e80 r8:8027f5e8 r7:ebfe9e60 r6:854d7200 r5:84a16c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec845fb0 to 0xec845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a75c0 INFO: task kworker/1:897:5876 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8ebf7000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 r5:00001000 r4:ed35d000 r4:848b5900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ebbe9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:856a2f00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5880 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5880 tgid:5880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec855d84 r8:00000002 r7:60000113 r6:ec855d8c r5:84969800 r4:84969800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84969800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a79c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbff000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8572e38c r4:8572e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572e38c r4:856a2f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84969800 r8:856a2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856a2f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a2f80 r8:8027f5e8 r7:ebfe9e60 r6:854d7300 r5:84969800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a75c0 INFO: task kworker/1:899:5880 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8ee29000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebc17000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 r5:85a35f8c r4:85a35c00 r4:848b5900 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r4:84968c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84968c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aa6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebeb1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85730b8c r4:85730800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85730b8c r4:854cb080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84968c00 r8:854cb0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb080 r8:8027f5e8 r7:ebfe9e60 r6:854d7400 r5:84968c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec861fb0 to 0xec861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a7d80 INFO: task kworker/1:901:5884 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8f25a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec865e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc5d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 r5:00001000 r4:ed35d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:903:5888 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:903 state:D stack:0 pid:5888 tgid:5888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec805d84 r8:00000002 r7:60000013 r6:ec805d8c r5:8496c800 r4:8496c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec805e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496c800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8572e78c r4:8572e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572e78c r4:854cb180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496c800 r8:854cb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb180 r8:8027f5e8 r7:ec861e60 r6:854d7500 r5:8496c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec805fb0 to 0xec805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:856a7d00 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8496d400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7d80 r5:00001000 r4:ebcbf000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec871fb0 to 0xec871ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:905 state:D stack:0 pid:5893 tgid:5893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec875d84 r8:00000002 r7:60000113 r6:ec875d8c r5:8496ec00 r4:8496ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec875e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aa000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcdd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8572f78c r4:8572f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572f78c r4:854cb280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496ec00 r8:854cb2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb280 r8:8027f5e8 r7:ec861e60 r6:854d7600 r5:8496ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a7f80 INFO: task kworker/1:905:5893 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 8fc21000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:5894 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:5894 tgid:5894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec879d84 r8:00000002 r7:60050013 r6:ec879d8c r5:8496a400 r4:8496a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473d140 r4:00000000 r9:83018005 r8:8496a400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 r5:00001000 r4:ebd03000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854d7680 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8ffe5000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:eaeb9dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:906:5896 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:906 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec881d84 r8:00000002 r7:60000013 r6:ec881d8c r5:8496e000 r4:8496e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aa140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496e000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8572fb8c r4:8572f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572fb8c r4:854cb300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496e000 r8:854cb32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb300 r8:8027f5e8 r7:ec861e60 r6:854d7780 r5:8496e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:853aa280 Workqueue: events bpf_prog_free_deferred 9d20: 9021b000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe59000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:5900 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:5900 tgid:5900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec885d84 r8:00000002 r7:60000113 r6:ec885d8c r5:84b90000 r4:84b90000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b90000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec885e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd3b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9088b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:908:5902 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:908 state:D stack:0 pid:5902 tgid:5902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec889d84 r8:00000002 r7:60000013 r6:ec889d8c r5:84b90c00 r4:84b90c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b90c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ebe8d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573038c r4:85730000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573038c r4:854cb400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r4:853aa580 Workqueue: events bpf_prog_free_deferred r4:00000000 9d20: 9088b000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:82ac11e4 r4:eaeb9dc0 r4:00000000 r5:00001000 r4:ed35d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec88dd84 r8:00000002 r7:60000013 r6:ec88dd8c r5:84b91800 r4:84b91800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b91800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aa7c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b91800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebec9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85730f8c r4:85730c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85730f8c r4:854cb480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b91800 r8:854cb4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb480 r8:8027f5e8 r7:ec861e60 r6:854d7a00 r5:84b91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec88dfb0 to 0xec88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853aa380 INFO: task kworker/1:909:5904 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 90c86000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:84b92400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebee1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:854cb500 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 90dd1000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb149000 r7:ddde2d80 r6:83018200 r5:8573238c r4:854cb580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b93000 r8:854cb5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb580 r8:8027f5e8 r7:ec891e60 r6:854d7b00 r5:84b93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec895fb0 to 0xec895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853aa700 INFO: task kworker/1:911:5908 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 90dd1000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ebf01000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854cb600 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:913:5913 blocked for more than 466 seconds. [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfb1d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8573078c r4:854cb680 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdbdfb0 to 0xebdbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853aabc0 INFO: task kworker/1:913:5913 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 914e8000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:914:5915 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:914 state:D stack:0 pid:5915 tgid:5915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebe11d84 r8:00000002 r7:60000113 r6:ebe11d8c r5:84b93c00 r4:84b93c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b93c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe11e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aac80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85731b8c r4:85731800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85731b8c r4:854cb700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b93c00 r8:854cb72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb700 r8:8027f5e8 r7:ec895e60 r6:854d7c80 r5:84b93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe11fb0 to 0xebe11ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Call trace: r5:84b95400 r4:82918884 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eaf73000 r5:85731f8c r4:85731c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:853aad80 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d20: 916c4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:916:5920 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:916 state:D stack:0 pid:5920 tgid:5920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebfadd84 r8:00000002 r7:60000013 r6:ebfadd8c r5:848d8c00 r4:848d8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848d8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568e440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85733b8c r4:85733800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85733b8c r4:854cb800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d8c00 r8:854cb82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb800 r8:8027f5e8 r7:ec895e60 r6:854d7d80 r5:848d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebfadfb0 to 0xebfadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853aae80 INFO: task kworker/1:916:5920 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37a000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d9800 r8:854cb8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb880 r8:8027f5e8 r7:ebfade60 r6:854d7e00 r5:848d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a1fb0 to 0xec8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853aa280 INFO: task kworker/1:917:5921 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 91952000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb435000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854cb900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 91952000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:856f4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd5e08 r5:00001000 r4:eb4cb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85732f8c r4:85732c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85732f8c r4:854cb980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f4800 r8:854cb9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cb980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cb980 r8:8027f5e8 r7:ebfade60 r6:854cba00 r5:856f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdd5fb0 to 0xebdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568e0c0 INFO: task kworker/1:919:5925 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 91e2d000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb6f7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573378c r4:85733400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573378c r4:854cba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f5400 r8:854cbaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cba80 r8:8027f5e8 r7:ebfade60 r6:854cbb00 r5:856f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568e380 INFO: task kworker/1:920:5927 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb7eb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85733f8c r4:854cbb80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: 924b4000 ed2f3000 00000001 80239b98 7f383000 00000001 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 task:kworker/1:922 state:D stack:0 pid:5931 tgid:5931 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568e6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb813000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573338c r4:85733000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573338c r4:854cbc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f6c00 r8:854cbcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cbc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cbc80 r8:8027f5e8 r7:ec8b1e60 r6:854cbd00 r5:856f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b5fb0 to 0xec8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568e340 INFO: task kworker/1:922:5931 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 926cc000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b9e08 r5:00001000 r4:ebfbd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8573778c r4:854cbd80 Exception stack(0xec8b9fb0 to 0xec8b9ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 926cc000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:924:5935 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:924 state:D stack:0 pid:5935 tgid:5935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec809d84 r8:00000002 r7:60000013 r6:ec809d8c r5:856f1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:eb84d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85683f8c r4:854cbe80 Exception stack(0xec809fb0 to 0xec809ff8) r4:8568e900 Call trace: 9d20: 92a54000 ed2f3000 00000001 80239b98 7f383000 00000001 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 task:kworker/1:925 state:D stack:0 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb9e9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8573438c r4:854cbf80 Exception stack(0xec8c1fb0 to 0xec8c1ff8) r4:8568ea40 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:926:5940 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:926 state:D stack:0 pid:5940 tgid:5940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec8c5d84 r8:00000002 r7:60000113 r6:ec8c5d8c r5:856b3c00 r4:856b3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568eb00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb49000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573478c r4:85734400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573478c r4:8575d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b3c00 r8:8575d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d080 r8:8027f5e8 r7:ec8b9e60 r6:8575d100 r5:856b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c5fb0 to 0xec8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568ea40 INFO: task kworker/1:926:5940 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 92ef4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:927:5941 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:927 state:D stack:0 pid:5941 tgid:5941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec8cdd84 r8:00000002 r7:60000013 r6:ec8cdd8c r5:856f8000 r4:856f8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568edc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85734b8c r4:85734800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85734b8c r4:8575d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f8000 r8:8575d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d180 r8:8027f5e8 r7:ec8b9e60 r6:8575d200 r5:856f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaeb9d28 to 0xeaeb9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:928 state:D stack:0 pid:5943 tgid:5943 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473dd40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbdb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573538c r4:85735000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573538c r4:8575d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f9800 r8:8575d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d280 r8:8027f5e8 r7:ec8b9e60 r6:8575d300 r5:856f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d1fb0 to 0xec8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568e7c0 INFO: task kworker/1:928:5943 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 93195000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:929:5946 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd51000 r7:ddde2d80 r6:83018200 r5:8573578c r4:8575d380 Exception stack(0xec8d9fb0 to 0xec8d9ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:5948 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:473 state:D stack:0 pid:5948 tgid:5948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec8c9d84 r8:00000002 r7:60000113 r6:ec8c9d8c r5:848d8000 r4:848d8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848d8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575f7c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe3d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cdb8c r4:855cd800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cdb8c r4:854d7f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d8000 r8:854d7f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d7f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d7f00 r8:8027f5e8 r7:ebfc1e60 r6:854d7f80 r5:848d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c9fb0 to 0xec8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: 9d20: 93492000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebd89000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85735b8c r4:8575d480 Exception stack(0xec8ddfb0 to 0xec8ddff8) r4:85687180 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 r5:85a35f8c r4:85a35c00 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 INFO: task kworker/1:931:5951 blocked for more than 466 seconds. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebdb1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85734f8c r4:85734c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85734f8c r4:8575d500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848dc800 r8:8575d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575d500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d500 r8:8027f5e8 r7:ec8b9e60 r6:85762080 r5:848dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e1fb0 to 0xec8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85687300 INFO: task kworker/1:931:5951 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 93a18000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:932:5953 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:932 state:D stack:0 pid:5953 tgid:5953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec8e5d84 r8:00000002 r7:60000013 r6:ec8e5d8c r5:848dd400 r4:848dd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848dd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856875c0 r5:00001000 r4:ebdd1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8573638c r4:85736000 r4:8575d580 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:82ac11e4 r4:00000000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebdf7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8573678c r4:8575d600 Exception stack(0xec8e9fb0 to 0xec8e9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85687500 INFO: task kworker/1:933:5955 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 941a1000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:934:5957 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:934 state:D stack:0 pid:5957 tgid:5957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec8edd84 r8:00000002 r7:60000113 r6:ec8edd8c r5:848dec00 r4:848dec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebe19000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85736b8c r4:8575d680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf23000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec8d5fb0 to 0xec8d5ff8) r4:85687080 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:eaeb9dc0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:5961 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:5961 tgid:5961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec8f1d84 r8:00000002 r7:60000113 r6:ec8f1d8c r5:84b96c00 r4:84b96c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b96c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575f880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf0d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cdf8c r4:855cdc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cdf8c r4:85762300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b96c00 r8:8576232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85762300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85762300 r8:8027f5e8 r7:ebfc1e60 r6:85762380 r5:84b96c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f1fb0 to 0xec8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575fa40 INFO: task kworker/0:474:5961 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9464d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf91000 r5:85736f8c r4:85736c00 r10:61c88647 r9:85060000 r8:8576242c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918888 r9:ec909d84 r8:00000002 r7:60000013 r6:ec909d8c r5:85060c00 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf7f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573738c r4:85737000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573738c r4:8575d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85060c00 r8:8575d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d780 r8:8027f5e8 r7:ec8b9e60 r6:85762500 r5:85060c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec909fb0 to 0xec909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85687ac0 INFO: task kworker/1:936:5965 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 951a8000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:937:5967 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:937 state:D stack:0 pid:5967 tgid:5967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918888 r9:ec90dd84 r8:00000002 r7:60000013 r6:ec90dd8c r5:85061800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e1700 r5:00001000 r4:eb947000 r5:8573db8c r4:8573d800 r10:61c88647 r9:85061800 r8:8575d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85687980 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:5969 tgid:5969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec8f5d84 r8:00000002 r7:60000113 r6:ec8f5d8c r5:85062400 r4:85062400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85062400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cdcc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85062400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cd78c r4:855cd400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cd78c r4:85762600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85062400 r8:8576262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85762600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85762600 r8:8027f5e8 r7:ebfc1e60 r6:85762680 r5:85062400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f5fb0 to 0xec8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575fbc0 INFO: task kworker/0:476:5969 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 957f2000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebfcb000 r5:85737f8c r4:85737c00 r4:8575d880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9589c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:939:5973 blocked for more than 467 seconds. task:kworker/1:939 state:D stack:0 pid:5973 tgid:5973 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85063000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0149000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573c38c r4:8573c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573c38c r4:8575d900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85063000 r8:8575d92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575d900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d900 r8:8027f5e8 r7:ec90de60 r6:85762780 r5:85063000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec91dfb0 to 0xec91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568ef80 INFO: task kworker/1:939:5973 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec925fb0 to 0xec925ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:eaeb9dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb53f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85065400 r8:8575da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854e1140 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 95e65000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:942:5979 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:942 state:D stack:0 pid:5979 tgid:5979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec935d84 r8:00000002 r7:60000113 r6:ec935d8c r5:85064800 r4:85064800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85064800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e14c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85064800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5fb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573cb8c r4:8573c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573cb8c r4:8575da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85064800 r8:8575daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575da80 r8:8027f5e8 r7:ec90de60 r6:85762900 r5:85064800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec935fb0 to 0xec935ff8) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e1640 r9:83018205 r8:856d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573d78c r4:8573d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573d78c r4:8575db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d8000 r8:8575db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575db00 r8:8027f5e8 r7:ec90de60 r6:85762980 r5:856d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec941fb0 to 0xec941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e1140 INFO: task kworker/1:943:5980 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 963bd000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:944 state:D stack:0 pid:5983 tgid:5983 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ebacd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8573e38c r4:8575db80 Exception stack(0xec949fb0 to 0xec949ff8) r4:854e1140 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:eaeb9dc0 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:945:5985 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:945 state:D stack:0 pid:5985 tgid:5985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec911d84 r8:00000002 r7:60000113 r6:ec911d8c r5:856fbc00 r4:856fbc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fbc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec911e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e1140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba75000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573d38c r4:8573d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573d38c r4:8575dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fbc00 r8:8575dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575dc00 r8:8027f5e8 r7:ec949e60 r6:8575dc80 r5:856fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec911fb0 to 0xec911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e1740 INFO: task kworker/1:945:5985 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 96c68000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e19c0 r5:00001000 r4:ebaa3000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573df8c r4:8573dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573df8c r4:8575dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fc800 r8:8575dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575dd00 r8:8027f5e8 r7:ec949e60 r6:8575dd80 r5:856fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec94dfb0 to 0xec94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e1900 INFO: task kworker/1:946:5987 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 97080000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:947:5990 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:947 state:D stack:0 pid:5990 tgid:5990 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb19000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8573ef8c r4:8575de00 Exception stack(0xec96dfb0 to 0xec96dff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:948 state:D stack:0 pid:5991 tgid:5991 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebaf7000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8573eb8c r4:8575df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fec00 r8:8575df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575df00 r8:8027f5e8 r7:ec96de60 r6:8575df80 r5:856fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e1c80 INFO: task kworker/1:948:5991 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 970d4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:949:5993 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:949 state:D stack:0 pid:5993 tgid:5993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec971d84 r8:00000002 r7:60000113 r6:ec971d8c r5:856fd400 r4:856fd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec971e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85687880 r5:00001000 r4:ebc19000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856fd400 r8:8576d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854e1ac0 Call trace: 9d20: 9759a000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:848b5900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:856f8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec969e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e1f40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573e78c r4:8573e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573e78c r4:8576d100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f8c00 r8:8576d12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576d100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576d100 r8:8027f5e8 r7:ec971e60 r6:8576d180 r5:856f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec969fb0 to 0xec969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e1900 INFO: task kworker/1:950:5996 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 978e0000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebcaf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573ff8c r4:8573fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573ff8c r4:8576d200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fb000 r8:8576d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576d200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576d200 r8:8027f5e8 r7:ec971e60 r6:8576d280 r5:856fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec979fb0 to 0xec979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85687780 INFO: task kworker/1:951:5998 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 978e0000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85066c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 r5:00001000 r4:ebc4f000 r5:8573fb8c r4:8573f800 r10:61c88647 r9:85066c00 r8:8576d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85700000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc79000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573f78c r4:8573f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573f78c r4:8576d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85700000 r8:8576d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576d400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576d400 r8:8027f5e8 r7:ec979e60 r6:8576d480 r5:85700000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec981fb0 to 0xec981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85773180 INFO: task kworker/1:953:6001 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 983d9000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85700c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:00001000 r4:ebef3000 r5:85749f8c r4:85749c00 r10:61c88647 r9:85700c00 r8:8576d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80000113 r4:80239bb0 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:955:6005 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:955 state:D stack:0 pid:6005 tgid:6005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec98dd84 r8:00000002 r7:60000113 r6:ec98dd8c r5:856dc800 r4:856dc800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856dc800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec98de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857735c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcd3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574838c r4:85748000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574838c r4:8576d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dc800 r8:8576d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576d600 r8:8027f5e8 r7:ec97de60 r6:85762a80 r5:856dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec98dfb0 to 0xec98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85773180 INFO: task kworker/1:955:6005 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 98952000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85773680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcef000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85748b8c r4:85748800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85748b8c r4:8576d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d8c00 r8:8576d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576d680 r8:8027f5e8 r7:ec97de60 r6:85762b00 r5:856d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec999fb0 to 0xec999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85773440 INFO: task kworker/1:956:6008 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 98952000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:957:6009 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:957 state:D stack:0 pid:6009 tgid:6009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec99dd84 r8:00000002 r7:60000113 r6:ec99dd8c r5:856db000 r4:856db000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856db000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd0d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857736c0 INFO: task kworker/1:957:6009 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 98d1d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Workqueue: events bpf_prog_free_deferred [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe85000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:00000001 task:kworker/1:959 state:D stack:0 pid:6014 tgid:6014 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebeaf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574938c r4:85749000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574938c r4:8576d800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856de000 r8:8576d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576d800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576d800 r8:8027f5e8 r7:ec97de60 r6:85762c80 r5:856de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b1fb0 to 0xec9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85773440 INFO: task kworker/1:959:6014 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 98f2b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:960:6015 blocked for more than 467 seconds. [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ebec1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d20: 994f8000 ed2f3000 00000001 80239b98 7f383000 00000001 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:961:6018 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:961 state:D stack:0 pid:6018 tgid:6018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec9cdd84 r8:00000002 r7:60000113 r6:ec9cdd8c r5:856dbc00 r4:856dbc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856dbc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9cde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85773cc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebed5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574978c r4:85749400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574978c r4:8576d900 r10:61c88647 r9:856dbc00 r8:8576d92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 INFO: task kworker/1:962:6020 blocked for more than 467 seconds. r10:82918888 r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:85068c00 r4:00000000 r9:83018205 r8:85068c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:00001000 r4:ebfef000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8576d980 r8:8027f5e8 r7:ec97de60 r6:85762e00 r5:85068c00 r4:85773d00 Call trace: 9d20: 99928000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:eaeb9dc0 r5:00001000 r4:ed35d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:eca15d84 r8:00000002 r7:60000013 r6:eca15d8c r5:85069800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575ffc0 r4:8576da00 Exception stack(0xeca15fb0 to 0xeca15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85773dc0 INFO: task kworker/1:963:6021 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 99f72000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:964:6023 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:964 state:D stack:0 pid:6023 tgid:6023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca1dd84 r8:00000002 r7:60000113 r6:eca1dd8c r5:85068000 r4:85068000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85068000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca1de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484d280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85068000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec80f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574af8c r4:8574ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574af8c r4:8576da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85068000 r8:8576daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576da80 r8:8027f5e8 r7:eca09e60 r6:85762f00 r5:85068000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca1dfb0 to 0xeca1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8484d080 INFO: task kworker/1:964:6023 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 99f72000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:848b5900 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r10:82918888 r9:eca25d84 r8:00000002 r7:60000113 r6:eca25d8c r5:8506bc00 r4:00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:8574b78c r4:8576db00 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d20: 9a4ae000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:966:6028 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:966 state:D stack:0 pid:6028 tgid:6028 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca31d84 r8:00000002 r7:60000013 r6:eca31d8c r5:8506b000 r4:8506b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8506b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca31e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484d3c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8506b000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574ab8c r4:8574a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574ab8c r4:8576db80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506b000 r8:8576dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576db80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576db80 r8:8027f5e8 r7:eca25e60 r6:84b75000 r5:8506b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca31fb0 to 0xeca31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8484d240 INFO: task kworker/1:966:6028 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9a4ae000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:967:6029 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:967 state:D stack:0 pid:6029 tgid:6029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca35d84 r8:00000002 r7:60000013 r6:eca35d8c r5:8506a400 r4:8506a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8506a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca35e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484d340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8506a400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574b38c r4:8574b000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574b38c r4:8576dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506a400 r8:8576dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576dc00 r8:8027f5e8 r7:eca25e60 r6:84b75080 r5:8506a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8484d140 INFO: task kworker/1:967:6029 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9a744000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:968:6032 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:968 state:D stack:0 pid:6032 tgid:6032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca41d84 r8:00000002 r7:60000013 r6:eca41d8c r5:8506c800 r4:8506c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8506c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574bb8c r4:8574b800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574bb8c r4:8576dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:8576dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576dc80 r8:8027f5e8 r7:eca25e60 r6:84b75100 r5:8506c800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d20: 9aae0000 ed2f3000 00000001 80239b98 7f383000 00000001 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:eaeb9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506d400 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574bf8c r4:8574bc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574bf8c r4:8576dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506d400 r8:8576dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576dd00 r8:8027f5e8 r7:eca41e60 r6:84b75180 r5:8506d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca45fb0 to 0xeca45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8484d840 INFO: task kworker/1:969:6033 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9aae0000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:970:6036 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:970 state:D stack:0 pid:6036 tgid:6036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca51d84 r8:00000002 r7:60000013 r6:eca51d8c r5:8506e000 r4:8506e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8506e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca51e08 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eca91000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8574df8c r4:8576dd80 r10:00000000 r9:8576dd80 r8:8027f5e8 r7:eca41e60 r6:84b75200 r5:8506e000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9aae0000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:971:6038 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:971 state:D stack:0 pid:6038 tgid:6038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec989d84 r8:00000002 r7:60000013 r6:ec989d8c r5:85701800 r4:85701800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85701800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484da00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85701800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec965000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574c38c r4:8574c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574c38c r4:8576de00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85701800 r8:8576de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576de00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576de00 r8:8027f5e8 r7:eca51e60 r6:8576de80 r5:85701800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8484d640 INFO: task kworker/1:971:6038 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9b0cc000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:972:6040 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:972 state:D stack:0 pid:6040 tgid:6040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca4dd84 r8:00000002 r7:60000113 r6:eca4dd8c r5:85702400 r4:85702400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85702400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca4de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484dac0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85702400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574cb8c r4:8574c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574cb8c r4:8576df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85702400 r8:8576df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8576df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8576df00 r8:8027f5e8 r7:eca51e60 r6:8576df80 r5:85702400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca4dfb0 to 0xeca4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8484d900 INFO: task kworker/1:972:6040 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9b0cc000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:973:6042 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:973 state:D stack:0 pid:6042 tgid:6042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca55d84 r8:00000002 r7:60000113 r6:eca55d8c r5:85703c00 r4:85703c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85703c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca55e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484dc40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85703c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574c78c r4:8574c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574c78c r4:8535b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85703c00 r8:8535b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:974:6043 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:974 state:D stack:0 pid:6043 tgid:6043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec985d84 r8:00000002 r7:60000113 r6:ec985d8c r5:85704800 r4:85704800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85704800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec985e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484dd00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85704800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca05000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574cf8c r4:8574cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574cf8c r4:8535b100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85704800 r8:8535b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535b100 r8:8027f5e8 r7:eca51e60 r6:8535b180 r5:85704800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec985fb0 to 0xec985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8484ddc0 INFO: task kworker/1:974:6043 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9b7c6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:975:6047 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:975 state:D stack:0 pid:6047 tgid:6047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca7dd84 r8:00000002 r7:60000113 r6:eca7dd8c r5:85706000 r4:85706000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85706000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca7de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5c140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85706000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca79000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574d78c r4:8574d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574d78c r4:8535b200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85706000 r8:8535b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535b200 r8:8027f5e8 r7:eca51e60 r6:8535b280 r5:85706000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:6048 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:6048 tgid:6048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca59d84 r8:00000002 r7:60000113 r6:eca59d8c r5:857b0c00 r4:857b0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cde00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ceb8c r4:855ce800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ceb8c r4:84b75280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b0c00 r8:84b752ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75280 r8:8027f5e8 r7:ebfc1e60 r6:84b75300 r5:857b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca59fb0 to 0xeca59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cd800 INFO: task kworker/0:477:6048 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9bc89000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:976 state:D stack:0 pid:6050 tgid:6050 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca75e08 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 r4:84a5c200 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9bc89000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:977:6053 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:977 state:D stack:0 pid:6053 tgid:6053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca99d84 r8:00000002 r7:60000113 r6:eca99d8c r5:856f2400 r4:856f2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca99e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5cec0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0691000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574e78c r4:8574e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574e78c r4:8535b400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f2400 r8:8535b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535b400 r8:8027f5e8 r7:eca51e60 r6:8535b480 r5:856f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca99fb0 to 0xeca99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5c580 INFO: task kworker/1:977:6053 is blocked on a mutex likely owned by task kworker/1:370:4428. [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9c404000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:6056 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:6056 tgid:6056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecab5d84 r8:00000002 r7:60000113 r6:ecab5d8c r5:85708000 r4:85708000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85708000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84734440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85708000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec817000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e6b8c r4:847e6800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e6b8c r4:84b75380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85708000 r8:84b753ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75380 r8:8027f5e8 r7:ebfc1e60 r6:8535b500 r5:85708000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab5fb0 to 0xecab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cdd00 INFO: task kworker/0:478:6056 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 9d20: 9c404000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:848b5900 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:479:6057 blocked for more than 467 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:6057 tgid:6057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecac1d84 r8:00000002 r7:60000113 r6:ecac1d8c r5:85708c00 r4:85708c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85708c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecac1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cda80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85708c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cf38c r4:855cf000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cf38c r4:84b75400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85708c00 r8:84b7542c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75400 r8:8027f5e8 r7:ecab5e60 r6:8535b580 r5:85708c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac1fb0 to 0xecac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cd680 INFO: task kworker/0:479:6057 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9c85c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:ecac9d84 r8:00000002 r7:60000113 r6:ecac9d8c r5:8570a400 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cd180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8570a400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cff8c r4:855cfc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cff8c r4:84b75480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570a400 r8:84b754ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75480 r8:8027f5e8 r7:ecab5e60 r6:8535b600 r5:8570a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac9fb0 to 0xecac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cda40 INFO: task kworker/0:480:6058 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9c85c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:979:6062 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:979 state:D stack:0 pid:6062 tgid:6062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ebfa1d84 r8:00000002 r7:60000113 r6:ebfa1d8c r5:85709800 r4:85709800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85709800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfa1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853be040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85709800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb699000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574ef8c r4:8574ec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574ef8c r4:8535b780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85709800 r8:8535b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535b780 r8:8027f5e8 r7:eca99e60 r6:8535b800 r5:85709800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebfa1fb0 to 0xebfa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5ccc0 INFO: task kworker/1:979:6062 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9cce6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r5:85a35f8c r4:85a35c00 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 INFO: task kworker/1:980:6065 blocked for more than 467 seconds. [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad5e08 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574eb8c r4:8574e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8535b880 r8:8027f5e8 r7:ebfa1e60 r6:8535b900 r5:8570c800 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:981:6068 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:981 state:D stack:0 pid:6068 tgid:6068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecaddd84 r8:00000002 r7:60000013 r6:ecaddd8c r5:8570e000 r4:8570e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8570e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecadde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853be800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb833000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574fb8c r4:8574f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574fb8c r4:8535b980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570e000 r8:8535b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535b980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535b980 r8:8027f5e8 r7:ebfa1e60 r6:8535ba00 r5:8570e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaddfb0 to 0xecaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853be180 INFO: task kworker/1:981:6068 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9d42d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 INFO: task kworker/0:481:6070 blocked for more than 467 seconds. Workqueue: events bpf_prog_free_deferred r5:8570d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e98c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8570d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb7b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cfb8c r4:855cf800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cfb8c r4:84b75500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570d400 r8:84b7552c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75500 r8:8027f5e8 r7:ecab5e60 r6:8535ba80 r5:8570d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae1fb0 to 0xecae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cd480 INFO: task kworker/0:481:6070 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9d42d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:ecad9d84 r8:00000002 r7:60000113 r6:ecad9d8c r5:8570ec00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853be300 r5:8574e38c r4:8574e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574e38c r4:8535bb00 r10:61c88647 r9:8570ec00 r8:8535bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:853be440 INFO: task kworker/1:982:6072 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9dcd5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:983:6073 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:983 state:D stack:0 pid:6073 tgid:6073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecae5d84 r8:00000002 r7:60000113 r6:ecae5d8c r5:8570bc00 r4:8570bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae5e08 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8574f78c r4:8574f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574f78c r4:8535bc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570bc00 r8:8535bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535bc00 r10:00000000 r9:8535bc00 r8:8027f5e8 r7:ecadde60 r6:8535bc80 r5:8570bc00 r4:853be2c0 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) r5:80000113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:00000000 r5:00001000 r4:ed35d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fa0: 00000000 00000000 00000000 00000000 r4:84bf9700 INFO: task kworker/1:984:6075 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:984 state:D stack:0 pid:6075 tgid:6075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca8dd84 r8:00000002 r7:60000113 r6:eca8dd8c r5:85703000 r4:85703000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85703000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853beb40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85703000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574ff8c r4:8574fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574ff8c r4:8535bd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85703000 r8:8535bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535bd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535bd00 r8:8027f5e8 r7:ecadde60 r6:8535bd80 r5:85703000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853be640 INFO: task kworker/1:984:6075 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9dfe4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:985:6078 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:985 state:D stack:0 pid:6078 tgid:6078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eca69d84 r8:00000002 r7:60000013 r6:eca69d8c r5:85706c00 r4:85706c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85706c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853be940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85706c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574f38c r4:8574f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574f38c r4:8535be00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85706c00 r8:8535be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535be00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535be00 r8:8027f5e8 r7:eca8de60 r6:8535be80 r5:85706c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca69fb0 to 0xeca69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:85a35f8c r4:85a35c00 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:986:6079 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:986 state:D stack:0 pid:6079 tgid:6079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecae9d84 r8:00000002 r7:60000113 r6:ecae9d8c r5:85710000 r4:85710000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85710000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bec80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85710000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575838c r4:85758000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575838c r4:8535bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85710000 r8:8535bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8535bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535bf00 r8:8027f5e8 r7:eca8de60 r6:8535bf80 r5:85710000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae9fb0 to 0xecae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853be640 INFO: task kworker/1:986:6079 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9e46a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:987:6081 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:987 state:D stack:0 pid:6081 tgid:6081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecaedd84 r8:00000002 r7:60000113 r6:ecaedd8c r5:85710c00 r4:85710c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85710c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bedc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85710c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd31000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575878c r4:85758400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575878c r4:8472f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85710c00 r8:8472f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472f000 r8:8027f5e8 r7:ecae9e60 r6:8472f080 r5:85710c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaedfb0 to 0xecaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853beb00 INFO: task kworker/1:987:6081 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9e62c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:988:6084 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:988 state:D stack:0 pid:6084 tgid:6084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecaf1d84 r8:00000002 r7:60000113 r6:ecaf1d8c r5:85711800 r4:85711800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85711800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5c900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85711800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd99000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85758b8c r4:85758800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85758b8c r4:8472f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85711800 r8:8472f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472f100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472f100 r8:8027f5e8 r7:ecaede60 r6:8472f180 r5:85711800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf1fb0 to 0xecaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853beb00 INFO: task kworker/1:988:6084 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:989 state:D stack:0 pid:6085 tgid:6085 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85758f8c r4:85758c00 r7:ddde2d80 r6:83018200 r5:85758f8c r4:8472f200 r10:61c88647 r9:85712400 r8:8472f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472f200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472f200 r8:8027f5e8 r7:ecaf1e60 r6:8472f280 r5:85712400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf5fb0 to 0xecaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bee00 INFO: task kworker/1:989:6085 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9eaab000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:990:6088 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:990 state:D stack:0 pid:6088 tgid:6088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecafdd84 r8:00000002 r7:60000113 r6:ecafdd8c r5:85713000 r5:85713000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8575978c r4:85759400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575978c r4:8472f300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85713000 r8:8472f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecafdfb0 to 0xecafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5c780 INFO: task kworker/1:990:6088 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9edc9000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:991:6089 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:991 state:D stack:0 pid:6089 tgid:6089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb01d84 r8:00000002 r7:60000113 r6:ecb01d8c r5:85714800 r4:85714800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85714800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb01e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521b7c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85714800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf89000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575a38c r4:8575a000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575a38c r4:8472f400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85714800 r8:8472f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472f400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472f400 r8:8027f5e8 r7:ecafde60 r6:8472f480 r5:85714800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb01fb0 to 0xecb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5c780 INFO: task kworker/1:991:6089 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9f111000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521b340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85715400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdf9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85759b8c r4:85759800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85759b8c r4:8472f500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85715400 r8:8472f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472f500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472f500 r8:8027f5e8 r7:ecb01e60 r6:8472f580 r5:85715400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf9fb0 to 0xecaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521b1c0 INFO: task kworker/1:992:6091 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9f111000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 Workqueue: events bpf_prog_free_deferred r5:85716000 r4:82918884 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521b480 r5:8575938c r4:85759000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8472f600 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:993:6094 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9f488000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:994:6095 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:994 state:D stack:0 pid:6095 tgid:6095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb09d84 r8:00000002 r7:60000013 r6:ecb09d8c r5:85716c00 r5:85716c00 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb09e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85759f8c r4:85759c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85759f8c r4:8472f700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85716c00 r8:8472f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472f700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472f700 r8:8027f5e8 r7:ecb01e60 r6:8472f780 r5:85716c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:995:6097 blocked for more than 468 seconds. r10:82918888 r9:ecb0dd84 r8:00000002 r7:60000013 r6:ecb0dd8c r5:85713c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb0de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521b700 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85713c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf25000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575a78c r4:8575a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575a78c r4:8472f800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85713c00 r8:8472f82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472f800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472f800 r8:8027f5e8 r7:ecb01e60 r6:8472f880 r5:85713c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb0dfb0 to 0xecb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521b840 INFO: task kworker/1:995:6097 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9f5a9000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:996:6100 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:996 state:D stack:0 pid:6100 tgid:6100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb11d84 r8:00000002 r7:60000013 r6:ecb11d8c r5:85718000 r4:85718000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85718000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb11e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85765080 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85718000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575bb8c r4:8575b800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575bb8c r4:8472f900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85718000 r8:8472f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472f900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472f900 r8:8027f5e8 r7:ecb01e60 r6:8472f980 r5:85718000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb11fb0 to 0xecb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521b6c0 INFO: task kworker/1:996:6100 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9fb25000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:997:6101 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:997 state:D stack:0 pid:6101 tgid:6101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb15d84 r8:00000002 r7:60000013 r6:ecb15d8c r5:85718c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb15e08 r4:00000000 r5:8575af8c r4:8575ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575af8c r4:8472fa00 r4:8472fa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472fa00 r8:8027f5e8 r7:ecb11e60 r6:8472fa80 r5:85718c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb15fb0 to 0xecb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521bb40 INFO: task kworker/1:997:6101 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: 9fb25000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:998:6104 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85719800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 r5:8575ab8c r4:8575a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575ab8c r4:8472fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85719800 r8:8472fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472fb00 r8:8027f5e8 r7:ecb11e60 r6:8472fb80 r5:85719800 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r4:eaeb9dc0 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:999:6106 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:999 state:D stack:0 pid:6106 tgid:6106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:8571a400 r4:8571a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521bcc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8571a400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575b38c r4:8575b000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575b38c r4:8472fc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571a400 r8:8472fc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472fc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472fc00 r8:8027f5e8 r7:ecb11e60 r6:8472fc80 r5:8571a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb21fb0 to 0xecb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521bd40 INFO: task kworker/1:999:6106 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a097e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1000:6108 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1000 state:D stack:0 pid:6108 tgid:6108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb25d84 r8:00000002 r7:60000013 r6:ecb25d8c r5:8571b000 r4:8571b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb25e08 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8575b78c r4:8575b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575b78c r4:8472fd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571b000 r8:8472fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472fd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472fd00 r8:8027f5e8 r7:ecb11e60 r6:8472fd80 r5:8571b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb25fb0 to 0xecb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521bec0 INFO: task kworker/1:1000:6108 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a097e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb400 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f078c r4:857f0400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8571bc00 r8:8472fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1002:6111 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1002 state:D stack:0 pid:6111 tgid:6111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb1dd84 r8:00000002 r7:60000013 r6:ecb1dd8c r5:8571c800 r4:8571c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8571c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb37000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85737b8c r4:85737800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85737b8c r4:8472ff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571c800 r8:8472ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472ff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472ff00 r8:8027f5e8 r7:ecb29e60 r6:8472ff80 r5:8571c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854eb080 INFO: task kworker/1:1002:6111 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:1003:6114 blocked for more than 468 seconds. r4:8571d400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb240 r5:8575bf8c r4:8575bc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575bf8c r4:85864000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571d400 r8:8586402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864000 r8:8027f5e8 r7:ecb29e60 r6:85864080 r5:8571d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb41fb0 to 0xecb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854eb540 INFO: task kworker/1:1003:6114 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a097e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb4de08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1005:6117 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1005 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb35d84 r8:00000002 r7:60000013 r6:ecb35d8c r5:8571ec00 r4:8571ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb35e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8571ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb5b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f0b8c r4:857f0800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f0b8c r4:85864200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571ec00 r8:8586422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864200 r8:8027f5e8 r7:ecb4de60 r6:85864280 r5:8571ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb35fb0 to 0xecb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854eb540 INFO: task kworker/1:1005:6117 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a1582000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1006:6119 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1006 state:D stack:0 pid:6119 tgid:6119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb65d84 r8:00000002 r7:60000013 r6:ecb65d8c r5:85828c00 r4:85828c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85828c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb65e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85828c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f0f8c r4:857f0c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f0f8c r4:85864300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a20c6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1008:6124 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1008 state:D stack:0 pid:6124 tgid:6124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb89d84 r8:00000002 r7:60000113 r6:ecb89d8c r5:8582a400 r4:8582a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8582a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f038c r4:857f0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:854eb540 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1009:6126 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1009 state:D stack:0 pid:6126 tgid:6126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb85d84 r8:00000002 r7:60000113 r6:ecb85d8c r5:8582b000 r4:8582b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8582b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb85e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ebf00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8582b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb93000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f1b8c r4:857f1800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f1b8c r4:85864600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582b000 r8:8586462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864600 r8:8027f5e8 r7:ecb71e60 r6:85864680 r5:8582b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb85fb0 to 0xecb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ebe40 INFO: task kworker/1:1009:6126 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:6127 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:6127 tgid:6127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecb99d84 r8:00000002 r7:60000113 r6:ecb99d8c r5:8582bc00 r4:8582bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8582bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cef8c r4:855cec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cef8c r4:84b75580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582bc00 r8:84b755ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75580 r8:8027f5e8 r7:ecab5e60 r6:85864700 r5:8582bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e9940 INFO: task kworker/0:482:6127 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a27f8000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r5:80000113 r4:80239bb0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f1f8c r4:857f1c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f1f8c r4:85864780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582c800 r8:858647ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864780 r8:8027f5e8 r7:ecb71e60 r6:85864800 r5:8582c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ebf80 INFO: task kworker/1:1010:6129 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a33c0000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 r4:eaeb9dc0 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586d1c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8582d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbaf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f178c r4:857f1400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f178c r4:85864880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582d400 r8:858648ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864880 r8:8027f5e8 r7:ecb71e60 r6:85864900 r5:8582d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba1fb0 to 0xecba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8586d100 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a33c0000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8582ec00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbbb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f238c r4:857f2000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f238c r4:85864980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582ec00 r8:858649ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864980 r8:8027f5e8 r7:ecb71e60 r6:85864a00 r5:8582ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb9fb0 to 0xecbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586d2c0 INFO: task kworker/1:1012:6133 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1013:6135 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1013 state:D stack:0 pid:6135 tgid:6135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecbc5d84 r8:00000002 r7:60000113 r6:ecbc5d8c r5:85829800 r4:85829800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85829800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586de00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85829800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbff000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f3b8c r4:857f3800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f3b8c r4:85864a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85829800 r8:85864aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864a80 r8:8027f5e8 r7:ecb71e60 r6:85864b00 r5:85829800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbc5fb0 to 0xecbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1014:6137 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1014 state:D stack:0 pid:6137 tgid:6137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecbd1d84 r8:00000002 r7:60000113 r6:ecbd1d8c r5:85830c00 r4:85830c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85830c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586d880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f2f8c r4:857f2c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f2f8c r4:85864b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85830c00 r8:85864bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864b80 r8:8027f5e8 r7:ecbc5e60 r6:85864c00 r5:85830c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd1fb0 to 0xecbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586d480 INFO: task kworker/1:1014:6137 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a3d66000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1015:6139 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1015 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecbddd84 r8:00000002 r7:60000013 r6:ecbddd8c r5:85830000 r4:85830000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f278c r4:857f2400 r7:ddde2d80 r6:83018200 r5:857f278c r4:85864c80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 9d20: a4189000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1016:6142 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1016 state:D stack:0 pid:6142 tgid:6142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecbfdd84 r8:00000002 r7:60000113 r6:ecbfdd8c r5:85832400 r4:85832400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85832400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586dc00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85832400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f378c r4:857f3400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f378c r4:85864d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85832400 r8:85864dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864d80 r8:8027f5e8 r7:ecbc5e60 r6:85864e00 r5:85832400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586dd40 INFO: task kworker/1:1016:6142 is blocked on a mutex likely owned by task kworker/1:370:4428. r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:84bf9700 task:kworker/0:483 state:D stack:0 pid:6144 tgid:6144 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:847e738c r4:84b75600 r4:84b75600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75600 r8:8027f5e8 r7:ecab5e60 r6:85864e80 r5:85833000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e9d40 INFO: task kworker/0:483:6144 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a4611000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1017:6145 blocked for more than 468 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85833c00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fc38c r4:857fc000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fc38c r4:85864f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85834800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85834800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec869e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586df40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85834800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb85000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f338c r4:857f3000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f338c r4:8586f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85834800 r8:8586f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f000 r8:8027f5e8 r7:ecbade60 r6:8586f080 r5:85834800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec869fb0 to 0xec869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586db00 INFO: task kworker/1:1018:6147 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a4c15000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r5:85a35f8c r4:85a35c00 r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:1019 state:D stack:0 pid:6149 tgid:6149 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858710c0 r5:00001000 r4:eb5ad000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xecc09fb0 to 0xecc09ff8) Workqueue: events bpf_prog_free_deferred 9d20: a4c15000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1020:6152 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1020 state:D stack:0 pid:6152 tgid:6152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec9a1d84 r8:00000002 r7:60000013 r6:ec9a1d8c r5:85836c00 r4:85836c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85836c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85871400 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85836c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb647000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fcf8c r4:857fcc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fcf8c r4:8586f200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85836c00 r8:8586f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586f200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f200 r8:8027f5e8 r7:ecc09e60 r6:8586f280 r5:85836c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a1fb0 to 0xec9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858712c0 INFO: task kworker/1:1020:6152 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a4c15000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 INFO: task kworker/1:1021:6154 blocked for more than 468 seconds. r4:8582e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08 r5:00001000 r4:eba81000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8582e000 r8:8586f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586f300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f300 r8:8027f5e8 r7:ec9a1e60 r6:8586f380 r5:8582e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec991fb0 to 0xec991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858713c0 INFO: task kworker/1:1021:6154 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a4ef8000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca21e08 r9:83018205 r8:85838000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:00001000 r4:ebafb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857fcb8c r4:857fc800 r10:61c88647 r9:85838000 r8:8586f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85871800 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 r4:84bf9700 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85839800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca39e08 r5:00001000 r4:ebac5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fd78c r4:857fd400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fd78c r4:8586f500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85839800 r8:8586f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586f500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f500 r8:8027f5e8 r7:eca21e60 r6:8586f580 r5:85839800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85871800 INFO: task kworker/1:1023:6158 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a570e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:6175 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec841000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e5f8c r4:847e5c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e5f8c r4:84b75680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b6000 r8:84b756ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75680 r8:8027f5e8 r7:ecab5e60 r6:84b75700 r5:857b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca29fb0 to 0xeca29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847345c0 INFO: task kworker/0:484:6175 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a5b5a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8583d400 r4:82918884 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587a0c0 r5:00001000 r4:ec829000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e5b8c r4:847e5800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e5b8c r4:84b75780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583d400 r8:84b757ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75780 r8:8027f5e8 r7:eca29e60 r6:8586f800 r5:8583d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc15fb0 to 0xecc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e9f40 INFO: task kworker/0:485:6177 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8583c800 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8579638c r4:85796000 Exception stack(0xecc1dfb0 to 0xecc1dff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a5b5a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece0d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e7b8c r4:858e7800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858e7b8c r4:84b75880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583a400 r8:84b758ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75880 r8:8027f5e8 r7:ecc1de60 r6:8586f900 r5:8583a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8587a080 INFO: task kworker/0:487:6180 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a6185000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:6324 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:8583b000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85795b8c r4:85795800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85795b8c r4:84b75900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583b000 r8:84b7592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75900 r8:8027f5e8 r7:ecc1de60 r6:8586f980 r5:8583b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd5dfb0 to 0xecd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85895600 INFO: task kworker/0:488:6324 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a6185000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:489:6368 blocked for more than 468 seconds. Call trace: r5:8583e000 r4:82918884 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ecac5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85796b8c r4:85796800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85796b8c r4:84b75980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583e000 r8:84b759ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75980 r8:8027f5e8 r7:ecc1de60 r6:8586fa00 r5:8583e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf55fb0 to 0xecf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575ce00 INFO: task kworker/0:489:6368 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a6694000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Not tainted 6.15.0-syzkaller #0 r4:85836000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf59e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0db000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:847ed78c r4:84b75a00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85831800 r4:82918884 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ecd21000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b75a80 r8:8027f5e8 r7:ecf59e60 r6:8586fb00 r5:85831800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf5dfb0 to 0xecf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575c980 INFO: task kworker/0:491:6370 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a6d5b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:6373 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:6373 tgid:6373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecf65d84 r8:00000002 r7:60000113 r6:ecf65d8c r5:85841800 r4:85841800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85841800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ecd51000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579578c r4:85795400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:6375 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:6375 tgid:6375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecf4dd84 r8:00000002 r7:60000113 r6:ecf4dd8c r5:857b2400 r4:857b2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf4de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece17000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579678c r4:85796400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579678c r4:84b75c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b2400 r8:84b75c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75c00 r8:8027f5e8 r7:ecf59e60 r6:84b75c80 r5:857b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf4dfb0 to 0xecf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734dc0 INFO: task kworker/0:493:6375 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) r5:80000113 r4:80239bb0 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:00001000 r4:ed35d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:6378 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:6378 tgid:6378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecf69d84 r8:00000002 r7:60000113 r6:ecf69d8c r5:857b1800 r4:857b1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f1ab000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece37000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85796f8c r4:85796c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85796f8c r4:84b75d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b1800 r8:84b75d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75d00 r8:8027f5e8 r7:ecf59e60 r6:84b75d80 r5:857b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf69fb0 to 0xecf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a0100 INFO: task kworker/0:494:6378 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a76c1000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:6380 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:6380 tgid:6380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecf6dd84 r8:00000002 r7:60000013 r6:ecf6dd8c r5:857b5400 r4:857b5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf6de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0100 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f1b3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588e38c r4:8588e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8588e38c r4:84b75e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b5400 r8:84b75e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75e00 r8:8027f5e8 r7:ecf59e60 r6:84b75e80 r5:857b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf6dfb0 to 0xecf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a0240 INFO: task kworker/0:495:6380 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a76c1000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecf71d84 r8:00000002 r7:60000113 r6:ecf71d8c r5:857b3c00 r4:857b3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf71e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1b7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf91000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579778c r4:85797400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579778c r4:84b75f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b3c00 r8:84b75f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75f00 r8:8027f5e8 r7:ecf59e60 r6:84b75f80 r5:857b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf71fb0 to 0xecf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a0580 INFO: task kworker/0:496:6385 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 r4:00000000 r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:6388 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:497 state:D stack:0 pid:6388 tgid:6388 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:857b6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf85e08 r5:00001000 r4:ecfa5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85797b8c r4:85877000 Exception stack(0xecf85fb0 to 0xecf85ff8) r4:856a0300 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a7ab0000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:6391 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:6391 tgid:6391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ecf99d84 r8:00000002 r7:60000113 r6:ecf99d8c r5:857b4800 r4:857b4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf99e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85946140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f249000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847edb8c r4:847ed800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847edb8c r4:85877100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b4800 r8:8587712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85877100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85877100 r8:8027f5e8 r7:ecf59e60 r6:85877180 r5:857b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf99fb0 to 0xecf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856a0700 INFO: task kworker/0:498:6391 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a8029000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:6476 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:6476 tgid:6476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed175d84 r8:00000002 r7:60000113 r6:ed175d8c r5:857b3000 r4:857b3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed175e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85946340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f24b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0cb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ecb8c r4:847ec800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ecb8c r4:85877200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b3000 r8:8587722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85877200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85877200 r8:8027f5e8 r7:ecf59e60 r6:85877280 r5:857b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed175fb0 to 0xed175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85946100 INFO: task kworker/0:499:6476 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a840a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:6478 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:6478 tgid:6478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed185d84 r8:00000002 r7:60000013 r6:ed185d8c r5:857b0000 r4:857b0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed185e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed11f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857b0000 r8:8587732c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed185fb0 to 0xed185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85946300 INFO: task kworker/0:500:6478 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a878a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506ec00 r9:83018005 r8:8506ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f24f000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Call trace: r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a878a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r5:00001000 r4:ed35d000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:ed107000 r7:dddced80 r6:83018000 r5:847ec78c r4:85877500 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8579c38c r4:8579c000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a8f15000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed199d84 r8:00000002 r7:60000013 r6:ed199d8c r5:85250c00 r4:85250c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85250c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed12f000 r5:847e7b8c r4:847e7800 r10:61c88647 r9:85250c00 r8:8587772c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a8f15000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) r4:84bf9700 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85251800 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r9:83018005 r8:85251800 r7:00000000 r6:83018000 r5:00001000 r4:7f257000 r5:00001000 r4:ed19f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ec38c r4:847ec000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ec38c r4:85877800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85251800 r8:8587782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85877800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85877800 r8:8027f5e8 r7:ed191e60 r6:85877880 r5:85251800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed19dfb0 to 0xed19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85946c00 INFO: task kworker/0:505:6489 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a903c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:6491 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:6491 tgid:6491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918888 r9:ed1a9d84 r8:00000002 r7:60000013 r6:ed1a9d8c r5:85252400 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:85252400 r7:00000000 r6:83018000 r5:00001000 r4:7f25b000 r5:00001000 r4:ed1b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8579cb8c r4:8579c800 r7:dddced80 r6:83018000 r5:8579cb8c r4:85877900 r4:85877900 r10:00000000 r9:85877900 r8:8027f5e8 r7:ed191e60 r6:85877980 r5:85252400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85946c00 INFO: task kworker/0:506:6491 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a9439000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:6492 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:6492 tgid:6492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed16dd84 r8:00000002 r7:60000013 r6:ed16dd8c r5:85253000 r4:85253000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85253000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed16de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569c3c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85253000 r7:00000000 r6:83018000 r5:00001000 r4:7f261000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1db000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579cf8c r4:8579cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579cf8c r4:85877a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85253000 r8:85877a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85877a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85877a00 r8:8027f5e8 r7:ed1a9e60 r6:85877a80 r5:85253000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed16dfb0 to 0xed16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85946e00 INFO: task kworker/0:507:6492 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a9439000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:6495 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:6495 tgid:6495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed1c1d84 r8:00000002 r7:60000013 r6:ed1c1d8c r5:85254800 r4:85254800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85254800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c1e08 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:85254800 r7:00000000 r6:83018000 r5:00001000 r4:7f25d000 r5:00001000 r4:ed1c3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8579c78c r4:8579c400 r7:dddced80 r6:83018000 r5:8579c78c r4:85877b00 Exception stack(0xed1c1fb0 to 0xed1c1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85946e00 INFO: task kworker/0:508:6495 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a9a43000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:6496 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:6496 tgid:6496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed1d5d84 r8:00000002 r7:60000113 r6:ed1d5d8c r5:85255400 r4:85255400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85255400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569c100 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85255400 r7:00000000 r6:83018000 r5:00001000 r4:7f25f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1cb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579d38c r4:8579d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579d38c r4:85877c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85255400 r8:85877c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85877c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85877c00 r8:8027f5e8 r7:ed16de60 r6:85877c80 r5:85255400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1d5fb0 to 0xed1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569c240 INFO: task kworker/0:509:6496 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: a9a43000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:6499 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed1b5d84 r8:00000002 r7:60000113 r6:ed1b5d8c r5:85253c00 r4:85253c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85253c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b5e08 r9:83018005 r8:85253c00 r7:00000000 r6:83018000 r5:00001000 r4:7f263000 r5:00001000 r4:ed1e7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579db8c r4:8579d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579db8c r4:85877d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85253c00 r8:85877d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 r4:eaeb9dc0 r4:00000000 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:6500 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:6500 tgid:6500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed1d9d84 r8:00000002 r7:60000013 r6:ed1d9d8c r5:85256c00 r4:85256c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85256c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569c980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85256c00 r7:00000000 r6:83018000 r5:00001000 r4:7f267000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ff000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579d78c r4:8579d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579d78c r4:85877e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85256c00 r8:85877e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85877e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85877e00 r8:8027f5e8 r7:ed1b5e60 r6:85877e80 r5:85256c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1d9fb0 to 0xed1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569c4c0 INFO: task kworker/0:511:6500 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: aa075000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:6502 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:6502 tgid:6502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed1e5d84 r8:00000002 r7:60000013 r6:ed1e5d8c r5:85256000 r4:85256000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85256000 r4:82918884 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569c780 r5:00001000 r4:ed1f3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579df8c r4:8579dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579df8c r4:85877f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85256000 r8:85877f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85877f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85877f00 r8:8027f5e8 r7:ed1d9e60 r6:85877f80 r5:85256000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e5fb0 to 0xed1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569c240 INFO: task kworker/0:512:6502 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: aa34d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:6504 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:6504 tgid:6504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed1fdd84 r8:00000002 r7:60000113 r6:ed1fdd8c r5:85848c00 r4:85848c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85848c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1fde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:ed21b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579eb8c r4:8579e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579eb8c r4:856ae000 r10:61c88647 r9:85848c00 r8:856ae02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae000 r8:8027f5e8 r7:ed1d9e60 r6:856ae080 r5:85848c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1fdfb0 to 0xed1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569c600 INFO: task kworker/0:513:6504 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: aaca3000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:6506 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:6506 tgid:6506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed215d84 r8:00000002 r7:60000013 r6:ed215d8c r5:85845400 r4:85845400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85845400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed215e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569cb40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85845400 r7:00000000 r6:83018000 r5:00001000 r4:7f269000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed20b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579e78c r4:8579e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579e78c r4:856ae100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85845400 r8:856ae12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae100 r8:8027f5e8 r7:ed1fde60 r6:8586fb80 r5:85845400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed215fb0 to 0xed215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569cac0 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:6508 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:6508 tgid:6508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed225d84 r8:00000002 r7:60000113 r6:ed225d8c r5:85846000 r4:85846000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85846000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed225e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569cf00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85846000 r7:00000000 r6:83018000 r5:00001000 r4:7f271000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed24b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579f38c r4:8579f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579f38c r4:856ae180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85846000 r8:856ae1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae180 r8:8027f5e8 r7:ed1fde60 r6:8586fc00 r5:85846000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed225fb0 to 0xed225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569cd40 INFO: task kworker/0:515:6508 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: abaf4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:6510 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:6510 tgid:6510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed22dd84 r8:00000002 r7:60000113 r6:ed22dd8c r5:85846c00 r4:85846c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85846c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed22de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569cd00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85846c00 r7:00000000 r6:83018000 r5:00001000 r4:7f26d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed22f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579e38c r4:8579e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579e38c r4:856ae200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85846c00 r8:856ae22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae200 r8:8027f5e8 r7:ed225e60 r6:8586fc80 r5:85846c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed22dfb0 to 0xed22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569cc80 INFO: task kworker/0:516:6510 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ac3ab000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:6512 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:6512 tgid:6512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed245d84 r8:00000002 r7:60000113 r6:ed245d8c r5:85843000 r4:85843000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85843000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed245e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569cdc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85843000 r7:00000000 r6:83018000 r5:00001000 r4:7f26f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed23b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579ef8c r4:8579ec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579ef8c r4:856ae280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85843000 r8:856ae2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae280 r8:8027f5e8 r7:ed225e60 r6:8586fd00 r5:85843000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed245fb0 to 0xed245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569cd40 INFO: task kworker/0:517:6512 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ac821000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:6514 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:6514 tgid:6514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed255d84 r8:00000002 r7:60000113 r6:ed255d8c r5:85840000 r4:85840000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85840000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed255e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f080 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85840000 r7:00000000 r6:83018000 r5:00001000 r4:7f277000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed27b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579fb8c r4:8579f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579fb8c r4:856ae300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85840000 r8:856ae32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae300 r8:8027f5e8 r7:ed225e60 r6:8586fd80 r5:85840000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed255fb0 to 0xed255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569ce00 INFO: task kworker/0:518:6514 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: accdf000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:519:6516 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:6516 tgid:6516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed265d84 r8:00000002 r7:60000113 r6:ed265d8c r5:85844800 r4:85844800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85844800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed265e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85844800 r7:00000000 r6:83018000 r5:00001000 r4:7f273000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed25b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579f78c r4:8579f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579f78c r4:856ae380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85844800 r8:856ae3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae380 r8:8027f5e8 r7:ed255e60 r6:8586fe00 r5:85844800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed265fb0 to 0xed265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568f080 INFO: task kworker/0:519:6516 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:82ac11e4 r4:eaeb9dc0 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:520:6518 blocked for more than 469 seconds. r10:82918888 r9:ed26dd84 r8:00000002 r7:60000113 r6:ed26dd8c r5:85840c00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed26f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579ff8c r4:8579fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579ff8c r4:856ae400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85840c00 r8:856ae42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae400 r8:8027f5e8 r7:ed255e60 r6:8586fe80 r5:85840c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed26dfb0 to 0xed26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568f080 INFO: task kworker/0:520:6518 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ad1d1000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:6521 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:6521 tgid:6521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed289d84 r8:00000002 r7:60000113 r6:ed289d8c r5:85843c00 r4:85843c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85843c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed289e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85843c00 r7:00000000 r6:83018000 r5:00001000 r4:7f279000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed28b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a878c r4:857a8400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a878c r4:856ae480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85843c00 r8:856ae4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae480 r8:8027f5e8 r7:ed255e60 r6:8586ff00 r5:85843c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed289fb0 to 0xed289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568f240 INFO: task kworker/0:521:6521 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ad455000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:6522 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:6522 tgid:6522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918888 r9:ed295d84 r8:00000002 r7:60000113 r6:ed295d8c r5:85850000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2df000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a9b8c r4:857a9800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a9b8c r4:856ae500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85850000 r8:856ae52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae500 r8:8027f5e8 r7:ed289e60 r6:8586ff80 r5:85850000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed295fb0 to 0xed295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568f380 INFO: task kworker/0:522:6522 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ad455000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:6524 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:6524 tgid:6524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed2a5d84 r8:00000002 r7:60000113 r6:ed2a5d8c r5:85851800 r4:85851800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85851800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f640 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85851800 r7:00000000 r6:83018000 r5:00001000 r4:7f27b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed29b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a838c r4:857a8000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a838c r4:856ae580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85851800 r8:856ae5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae580 r8:8027f5e8 r7:ed295e60 r6:85886000 r5:85851800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a5fb0 to 0xed2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568f4c0 INFO: task kworker/0:523:6524 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:6526 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:6526 tgid:6526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed2b5d84 r8:00000002 r7:60000013 r6:ed2b5d8c r5:85853000 r4:85853000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85853000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2b5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85853000 r7:00000000 r6:83018000 r5:00001000 r4:7f27d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2ab000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a8b8c r4:857a8800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a8b8c r4:856ae600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85853000 r8:856ae62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae600 r8:8027f5e8 r7:ed295e60 r6:85886080 r5:85853000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2b5fb0 to 0xed2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568f380 INFO: task kworker/0:524:6526 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ad815000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:6528 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed1f1d84 r8:00000002 r7:60000113 r6:ed1f1d8c r5:85849800 r4:85849800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85849800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85849800 r7:00000000 r6:83018000 r5:00001000 r4:7f27f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2bb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a938c r4:857a9000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a938c r4:856ae680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85849800 r8:856ae6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae680 r8:8027f5e8 r7:ed295e60 r6:856ae700 r5:85849800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f1fb0 to 0xed1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568f680 INFO: task kworker/0:525:6528 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: adb63000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:6530 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:6530 tgid:6530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed209d84 r8:00000002 r7:60000013 r6:ed209d8c r5:8584a400 r4:8584a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8584a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed209e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584a400 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2c7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a8f8c r4:857a8c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a8f8c r4:856ae780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584a400 r8:856ae7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae780 r8:8027f5e8 r7:ed295e60 r6:856ae800 r5:8584a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed209fb0 to 0xed209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568f9c0 INFO: task kworker/0:526:6530 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ade5b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:6533 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:6533 tgid:6533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed2b9d84 r8:00000002 r7:60000113 r6:ed2b9d8c r5:8584b000 r4:8584b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8584b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2b9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568fa80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584b000 r7:00000000 r6:83018000 r5:00001000 r4:7f283000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2d3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a978c r4:857a9400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a978c r4:856ae880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584b000 r8:856ae8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae880 r8:8027f5e8 r7:ed295e60 r6:856ae900 r5:8584b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2b9fb0 to 0xed2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568fb80 INFO: task kworker/0:527:6533 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ade5b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:6535 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:6535 tgid:6535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed2d1d84 r8:00000002 r7:60000013 r6:ed2d1d8c r5:8584bc00 r4:8584bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8584bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2d1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568fdc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2eb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aa38c r4:857aa000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aa38c r4:856ae980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584bc00 r8:856ae9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856ae980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ae980 r8:8027f5e8 r7:ed295e60 r6:856aea00 r5:8584bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2d1fb0 to 0xed2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568fb80 INFO: task kworker/0:528:6535 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ae4d1000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:6536 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:6536 tgid:6536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed2c5d84 r8:00000002 r7:60000013 r6:ed2c5d8c r5:8584c800 r4:8584c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8584c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b9f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584c800 r7:00000000 r6:83018000 r5:00001000 r4:7f229000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a9f8c r4:857a9c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a9f8c r4:856aea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584c800 r8:856aeaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856aea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856aea80 r8:8027f5e8 r7:ed2d1e60 r6:856aeb00 r5:8584c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c5fb0 to 0xed2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568fb80 INFO: task kworker/0:529:6536 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ae93c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:6539 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:6539 tgid:6539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed2e9d84 r8:00000002 r7:60000113 r6:ed2e9d8c r5:8584d400 r4:8584d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8584d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2e9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a7900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584d400 r7:00000000 r6:83018000 r5:00001000 r4:7f289000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aab8c r4:857aa800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aab8c r4:856aeb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584d400 r8:856aebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856aeb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856aeb80 r8:8027f5e8 r7:ed2c5e60 r6:856aec00 r5:8584d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2e9fb0 to 0xed2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568ff40 INFO: task kworker/0:530:6539 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: aed08000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:6540 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:6540 tgid:6540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed2f5d84 r8:00000002 r7:60000113 r6:ed2f5d8c r5:8584e000 r4:8584e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8584e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b7040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed01f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594d78c r4:8594d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8594d78c r4:856aec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584e000 r8:856aecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856aec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856aec80 r8:8027f5e8 r7:ed2e9e60 r6:856aed00 r5:8584e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f5fb0 to 0xed2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858a73c0 INFO: task kworker/0:531:6540 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: aed08000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:6542 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:6542 tgid:6542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed2f9d84 r8:00000002 r7:60000113 r6:ed2f9d8c r5:8584ec00 r4:8584ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8584ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856890c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f28b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aaf8c r4:857aac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aaf8c r4:856aed80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584ec00 r8:856aedac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856aed80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856aed80 r8:8027f5e8 r7:ed2f5e60 r6:856aee00 r5:8584ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f9fb0 to 0xed2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858a76c0 INFO: task kworker/0:532:6542 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: af331000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:6544 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:6544 tgid:6544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed2fdd84 r8:00000002 r7:60000013 r6:ed2fdd8c r5:85848000 r4:85848000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85848000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2fde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85689240 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85848000 r7:00000000 r6:83018000 r5:00001000 r4:7f28d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aa78c r4:857aa400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aa78c r4:856aee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85848000 r8:856aeeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856aee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856aee80 r8:8027f5e8 r7:ed2f5e60 r6:856aef00 r5:85848000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2fdfb0 to 0xed2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85689140 INFO: task kworker/0:533:6544 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: af616000 ed2f3000 00000001 80239b98 7f383000 00000001 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:6547 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:6547 tgid:6547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed301d84 r8:00000002 r7:60000113 r6:ed301d8c r5:858f8000 r4:858f8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed301e08 r5:00001000 r4:ecd39000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ab38c r4:857ab000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ab38c r4:856aef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f8000 r8:856aefac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856aef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856aef80 r8:8027f5e8 r7:ed2f5e60 r6:85865000 r5:858f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed301fb0 to 0xed301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85689400 INFO: task kworker/0:534:6547 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: af6e5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:848b5900 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) INFO: task kworker/0:535:6549 blocked for more than 470 seconds. r4:858f8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed309e08 r4:00000000 r5:00001000 r4:ece19000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ab78c r4:857ab400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:535:6549 is blocked on a mutex likely owned by task kworker/1:370:4428. r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: af6e5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:6551 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:6551 tgid:6551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed30dd84 r8:00000002 r7:60000013 r6:ed30dd8c r5:858f9800 r4:858f9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed30de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85689680 r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece6d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858f9800 r8:858651ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:858fa400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed311e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecec1000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8594c38c r4:85865280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fa400 r8:858652ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85865280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85865280 r8:8027f5e8 r7:ed2f5e60 r6:85865300 r5:858fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed311fb0 to 0xed311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85689700 INFO: task kworker/0:537:6553 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: afac5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:6555 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:6555 tgid:6555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed315d84 r8:00000002 r7:60000013 r6:ed315d8c r5:858fb000 r4:858fb000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858fb000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed315e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85689700 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f297000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf09000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594c78c r4:8594c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8594c78c r4:85865380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fb000 r8:858653ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85865380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85865380 r8:8027f5e8 r7:ed2f5e60 r6:85865400 r5:858fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed315fb0 to 0xed315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:538:6555 is blocked on a mutex likely owned by task kworker/1:370:4428. 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:ed305d84 r8:00000002 r7:60000013 r6:ed305d8c r5:858fbc00 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ecf87000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594cb8c r4:8594c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8594cb8c r4:85865480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fbc00 r8:858654ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85865480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85865480 r8:8027f5e8 r7:ed2f5e60 r6:85865500 r5:858fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed305fb0 to 0xed305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85689b80 INFO: task kworker/0:539:6556 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b0558000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:6560 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed319e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8594d38c r4:85865580 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:6562 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:6562 tgid:6562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed321d84 r8:00000002 r7:60000113 r6:ed321d8c r5:858fd400 r4:858fd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858fd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed321e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85689fc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f29f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594db8c r4:8594d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8594db8c r4:85865680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fd400 r8:858656ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85865680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85865680 r8:8027f5e8 r7:ed2f5e60 r6:85865700 r5:858fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed321fb0 to 0xed321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:6564 tgid:6564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed325d84 r8:00000002 r7:60000113 r6:ed325d8c r5:858fe000 r4:858fe000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858fe000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed325e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b7580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed343000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594eb8c r4:8594e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8594eb8c r4:85865780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fe000 r8:858657ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85865780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85865780 r8:8027f5e8 r7:ed2f5e60 r6:85865800 r5:858fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed325fb0 to 0xed325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b70c0 INFO: task kworker/0:542:6564 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed32b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed31dfb0 to 0xed31dff8) r4:854b71c0 Call trace: r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:6567 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:6567 tgid:6567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed329d84 r8:00000002 r7:60000113 r6:ed329d8c r5:857c0000 r4:857c0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857c0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed329e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b7180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed337000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594df8c r4:8594dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8594df8c r4:85865980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857c0000 r8:858659ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85865980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85865980 r8:8027f5e8 r7:ed325e60 r6:85865a00 r5:857c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed329fb0 to 0xed329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854b73c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaeb9d28 to 0xeaeb9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:857c0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed335e08 r5:00001000 r4:ed34f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8594e78c r4:8594e400 r10:61c88647 r9:857c0c00 r8:85865aac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b7440 INFO: task kworker/0:545:6570 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b116b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:6572 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:6572 tgid:6572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed34dd84 r8:00000002 r7:60000013 r6:ed34dd8c r5:857c1800 r4:857c1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857c1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed34de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b7840 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f2ab000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594ef8c r4:8594ec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8594ef8c r4:85865b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xed34dfb0 to 0xed34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b7500 INFO: task kworker/0:546:6572 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b15af000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed367000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857c2400 r8:85865cac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:548 state:D stack:0 pid:6575 tgid:6575 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed359e08 r9:83018005 r8:857c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f2af000 r5:00001000 r4:ed373000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85865d80 r8:8027f5e8 r7:ed341e60 r6:85865e00 r5:857c3000 INFO: task kworker/0:548:6575 is blocked on a mutex likely owned by task kworker/1:370:4428. Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:6578 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:6578 tgid:6578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed371d84 r8:00000002 r7:60000013 r6:ed371d8c r5:857c4800 r4:857c4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857c4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed371e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b7e80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f2b1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed37f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594ff8c r4:8594fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8594ff8c r4:85865e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857c4800 r8:85865eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85865e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85865e80 r8:8027f5e8 r7:ed359e60 r6:85865f00 r5:857c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed371fb0 to 0xed371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b7b00 INFO: task kworker/0:549:6578 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b26ed000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:6579 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:6579 tgid:6579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:857c5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed37de08 r5:00001000 r4:ed3b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: b2e10000 ed2f3000 00000001 80239b98 7f383000 00000001 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918888 r9:ed389d84 r8:00000002 r7:60000113 r6:ed389d8c r5:857c3c00 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed38b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8594fb8c r4:8508a080 Exception stack(0xed389fb0 to 0xed389ff8) r4:854b7bc0 Workqueue: events bpf_prog_free_deferred 9d20: b2e10000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:6584 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:6584 tgid:6584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed3a1d84 r8:00000002 r7:60000113 r6:ed3a1d8c r5:857c6c00 r4:857c6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857c6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1200 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3a3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595838c r4:85958000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8595838c r4:8508a180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857c6c00 r8:8508a1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508a180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a180 r8:8027f5e8 r7:ed37de60 r6:8508a200 r5:857c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a1fb0 to 0xed3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847d1000 INFO: task kworker/0:552:6584 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b341e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 r5:00001000 r4:ed35d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:6586 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:6586 tgid:6586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed39dd84 r8:00000002 r7:60000013 r6:ed39dd8c r5:857c8c00 r4:857c8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857c8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed39de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3ab000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595878c r4:85958400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8595878c r4:8508a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857c8c00 r8:8508a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a280 r8:8027f5e8 r7:ed37de60 r6:8508a300 r5:857c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed39dfb0 to 0xed39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847d1340 INFO: task kworker/0:553:6586 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b341e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 r5:85a35f8c r4:85a35c00 r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed3d3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:00001000 r4:ed35d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:6591 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:6591 tgid:6591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed3b5d84 r8:00000002 r7:60000013 r6:ed3b5d8c r5:857c9800 r4:857c9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857c9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f2bd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3bf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595938c r4:85959000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8595938c r4:8508a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857c9800 r8:8508a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a480 r8:8027f5e8 r7:ed3cde60 r6:8508a500 r5:857c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b5fb0 to 0xed3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847d1680 INFO: task kworker/0:555:6591 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b377f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:6592 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1bc0 r5:00001000 r4:ed3db000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857c8000 r8:8508a5ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: b3b83000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:557 state:D stack:0 pid:6595 tgid:6595 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3e5e08 r9:83018005 r8:857cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f2c5000 r5:00001000 r4:ed3f3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85959f8c r4:8508a680 5fa0: 00000000 00000000 00000000 00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:558 state:D stack:0 pid:6596 tgid:6596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed3eb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:559:6599 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:559 state:D stack:0 pid:6599 tgid:6599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed3c9d84 r8:00000002 r7:60000013 r6:ed3c9d8c r5:857cd400 r4:857cd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857cd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3c9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850de280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f2c9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed40b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595ab8c r4:8595a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8595ab8c r4:8508a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857cd400 r8:8508a8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a880 r8:8027f5e8 r7:ed3e5e60 r6:8508a900 r5:857cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3c9fb0 to 0xed3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847d1fc0 INFO: task kworker/0:559:6599 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b4175000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f2c7000 r5:00001000 r4:ed3ff000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595a78c r4:8595a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8595a78c r4:8508a980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ce000 r8:8508a9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508a980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a980 r8:8027f5e8 r7:ed3c9e60 r6:8508aa00 r5:857ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3fdfb0 to 0xed3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850de100 INFO: task kworker/0:560:6601 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b431e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:6603 tgid:6603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed409d84 r8:00000002 r7:60000113 r6:ed409d8c r5:857cec00 r4:857cec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857cec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed409e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850de500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f2cd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed423000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595a38c r4:8595a000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8595a38c r4:8508aa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857cec00 r8:8508aaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508aa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508aa80 r8:8027f5e8 r7:ed3c9e60 r6:8508ab00 r5:857cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed409fb0 to 0xed409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850de480 INFO: task kworker/0:561:6603 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaeb9dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed365d84 r8:00000002 r7:60000013 r6:ed365d8c r5:857ca400 r4:857ca400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ca400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed365e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850de300 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f2cb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed417000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595af8c r4:8595ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8595af8c r4:8508ab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ca400 r8:8508abac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508ab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ab80 r8:8027f5e8 r7:ed409e60 r6:8508ac00 r5:857ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed365fb0 to 0xed365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850de480 INFO: task kworker/0:562:6604 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b473f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed453000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857c6000 r8:8508acac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508ac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ac80 r8:8027f5e8 r7:ed409e60 r6:8508ad00 r5:857c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed415fb0 to 0xed415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850de480 INFO: task kworker/0:563:6607 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b4a56000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850de780 r5:00001000 r4:ed42f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595b78c r4:8595b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8595b78c r4:8508ad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d8000 r8:8508adac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508ad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ad80 r8:8027f5e8 r7:ed415e60 r6:8508ae00 r5:857d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed421fb0 to 0xed421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850de600 INFO: task kworker/0:564:6608 is blocked on a mutex likely owned by task kworker/1:370:4428. Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:00000000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 task:kworker/0:565 state:D stack:0 pid:6611 tgid:6611 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed43b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed42dfb0 to 0xed42dff8) r4:850de580 Call trace: 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:00000000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 INFO: task kworker/0:566:6613 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:6613 tgid:6613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed445d84 r8:00000002 r7:60000113 r6:ed445d8c r5:857d9800 r4:857d9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed445e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dea40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f2d3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed447000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595bf8c r4:8595bc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8595bf8c r4:8508af80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d9800 r8:8508afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508af80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508af80 r8:8027f5e8 r7:ed415e60 r6:85866000 r5:857d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed445fb0 to 0xed445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850de480 INFO: task kworker/0:566:6613 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b51a2000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r5:85a35f8c r4:85a35c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918888 r9:ed451d84 r8:00000002 r7:60000113 r6:ed451d8c r5:857da400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed451e08 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed45f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857da400 r8:858660ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xed451fb0 to 0xed451ff8) r4:850dea00 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:6616 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:6616 tgid:6616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed439d84 r8:00000002 r7:60000113 r6:ed439d8c r5:857db000 r4:857db000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857db000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed439e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dee80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857db000 r7:00000000 r6:83018000 r5:00001000 r4:7f2d9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed46b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85960b8c r4:85960800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85960b8c r4:85866180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857db000 r8:858661ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866180 r8:8027f5e8 r7:ed451e60 r6:85866200 r5:857db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed439fb0 to 0xed439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850dee00 INFO: task kworker/0:568:6616 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b5520000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:6625 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:6625 tgid:6625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed45dd84 r8:00000002 r7:60000113 r6:ed45dd8c r5:857dbc00 r4:857dbc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857dbc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed45de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85871e00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f23f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece29000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85960f8c r4:85960c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85960f8c r4:85866280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857dbc00 r8:858662ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866280 r8:8027f5e8 r7:ed439e60 r6:85866300 r5:857dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed45dfb0 to 0xed45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8598c400 INFO: task kworker/0:569:6625 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b5d60000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:6626 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:6626 tgid:6626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed469d84 r8:00000002 r7:60000113 r6:ed469d8c r5:857dc800 r4:857dc800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857dc800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed469e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f241000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed049000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596178c r4:85961400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596178c r4:85866380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857dc800 r8:858663ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866380 r8:8027f5e8 r7:ed45de60 r6:85866400 r5:857dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed469fb0 to 0xed469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8598c400 INFO: task kworker/0:570:6626 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b5d60000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:6627 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:6627 tgid:6627 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e1e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed063000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85866480 r8:8027f5e8 r7:ed469e60 r6:85866500 r5:857dd400 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:857de000 r7:00000000 r6:83018000 r5:00001000 r4:7f245000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed085000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596278c r4:85962400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596278c r4:85866580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857de000 r8:858665ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866580 r8:8027f5e8 r7:ed1e1e60 r6:85866600 r5:857de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1edfb0 to 0xed1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8598c400 INFO: task kworker/0:572:6628 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b63d7000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:857dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f247000 r5:00001000 r4:ed0a9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:857dec00 r8:858666ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8598c400 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c3000 r5:8596378c r4:85963400 r10:61c88647 r9:857e0000 r8:858667ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d20: b666e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:6631 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:6631 tgid:6631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed211d84 r8:00000002 r7:60000113 r6:ed211d8c r5:857e0c00 r4:857e0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed211e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dbe00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f241000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed07b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85963b8c r4:85963800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85963b8c r4:85866880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e0c00 r8:858668ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866880 r8:8027f5e8 r7:ed205e60 r6:85866900 r5:857e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed211fb0 to 0xed211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8598c180 INFO: task kworker/0:575:6631 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b6b18000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:6633 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:6633 tgid:6633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed219d84 r8:00000002 r7:60000013 r6:ed219d8c r5:857e1800 r4:857e1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed219e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598cc00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f24d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85962b8c r4:85962800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85962b8c r4:85866980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e1800 r8:858669ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866980 r8:8027f5e8 r7:ed211e60 r6:85866a00 r5:857e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed219fb0 to 0xed219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8598c180 INFO: task kworker/0:576:6633 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b6f2d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a35f8c r4:85a35c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:6635 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:6635 tgid:6635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed221d84 r8:00000002 r7:60000113 r6:ed221d8c r5:857e3000 r4:857e3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed221e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587d500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f2b7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4df000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85961b8c r4:85961800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85961b8c r4:85866a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e3000 r8:85866aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866a80 r8:8027f5e8 r7:ed211e60 r6:85866b00 r5:857e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed221fb0 to 0xed221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8598c480 INFO: task kworker/0:577:6635 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b732c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed35d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84bf9700 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:857e3c00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0ab000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ef78c r4:847ef400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ef78c r4:85866b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e3c00 r8:85866bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866b80 r8:8027f5e8 r7:ed211e60 r6:85866c00 r5:857e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed385fb0 to 0xed385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8587d680 INFO: task kworker/0:578:6689 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b732c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:6699 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:6699 tgid:6699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed235d84 r8:00000002 r7:60000113 r6:ed235d8c r5:857e5400 r4:857e5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed235e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f33b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1b9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596c78c r4:8596c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596c78c r4:85866c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e5400 r8:85866cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866c80 r8:8027f5e8 r7:ed385e60 r6:85866d00 r5:857e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed235fb0 to 0xed235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858620c0 INFO: task kworker/0:579:6699 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b750b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:6700 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:6700 tgid:6700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed465d84 r8:00000002 r7:60000113 r6:ed465d8c r5:857e6000 r4:857e6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed465e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858622c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f2cd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2e1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85963f8c r4:85963c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85963f8c r4:85866d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e6000 r8:85866dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866d80 r8:8027f5e8 r7:ed235e60 r6:85866e00 r5:857e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed465fb0 to 0xed465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858620c0 INFO: task kworker/0:580:6700 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b750b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed093000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:847efb8c r4:85866e80 r10:61c88647 r9:857e2400 r8:85866eac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xed1bdfb0 to 0xed1bdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b7867000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:6769 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:6769 tgid:6769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed5e5d84 r8:00000002 r7:60000113 r6:ed5e5d8c r5:853e2400 r4:853e2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5e5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f2cd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0e1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857abf8c r4:857abc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857abf8c r4:85866f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e2400 r8:85866fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85866f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85866f80 r8:8027f5e8 r7:ed235e60 r6:85769000 r5:853e2400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:583 state:D stack:0 pid:6771 tgid:6771 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f337000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed137000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847eef8c r4:847eec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847eef8c r4:85769080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0000 r8:857690ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769080 r8:8027f5e8 r7:ed235e60 r6:85769100 r5:853e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed579fb0 to 0xed579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847dbdc0 INFO: task kworker/0:583:6771 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b7d41000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:6774 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:6774 tgid:6774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed5a5d84 r8:00000002 r7:60000113 r6:ed5a5d8c r5:853e3000 r4:853e3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587dfc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f339000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed193000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596c38c r4:8596c000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596c38c r4:85769180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3000 r8:857691ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769180 r8:8027f5e8 r7:ed235e60 r6:85769200 r5:853e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5a5fb0 to 0xed5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8587db40 INFO: task kworker/0:584:6774 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b806d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:6776 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:6776 tgid:6776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed649d84 r8:00000002 r7:60000113 r6:ed649d8c r5:853e3c00 r4:853e3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed649e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856854c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f341000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2d9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596cf8c r4:8596cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596cf8c r4:85769280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3c00 r8:857692ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769280 r8:8027f5e8 r7:ed235e60 r6:85769300 r5:853e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed649fb0 to 0xed649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85685100 INFO: task kworker/0:585:6776 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b806d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918888 r9:ed64dd84 r8:00000002 r7:60000013 r6:ed64dd8c r5:853e4800 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed257000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596cb8c r4:8596c800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596cb8c r4:85769380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e4800 r8:857693ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769380 r8:8027f5e8 r7:ed649e60 r6:85769400 r5:853e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed64dfb0 to 0xed64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856852c0 INFO: task kworker/0:586:6778 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b8868000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:6779 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:6779 tgid:6779 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r4:853e5400 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed29d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596d38c r4:8596d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596d38c r4:85769480 r10:61c88647 r9:853e5400 r8:857694ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xed655fb0 to 0xed655ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b8c5e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:6782 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:6782 tgid:6782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed659d84 r8:00000002 r7:60000113 r6:ed659d8c r5:853e6000 r4:853e6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed659e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f343000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed47b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596db8c r4:8596d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596db8c r4:85769580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e6000 r8:857695ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769580 r8:8027f5e8 r7:ed649e60 r6:85769600 r5:853e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed659fb0 to 0xed659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85685580 INFO: task kworker/0:588:6782 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b8c5e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:6783 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:6783 tgid:6783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed4c9d84 r8:00000002 r7:60000113 r6:ed4c9d8c r5:853e6c00 r4:853e6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4c9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f345000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed49b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596d78c r4:8596d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596d78c r4:85769680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e6c00 r8:857696ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769680 r8:8027f5e8 r7:ed659e60 r6:85769700 r5:853e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4c9fb0 to 0xed4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85685600 INFO: task kworker/0:589:6783 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b8fc4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:853e0c00 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c1040 r5:00001000 r4:ed53b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8596f38c r4:85769780 r10:00000000 r9:85769780 r8:8027f5e8 r7:ed4c9e60 r6:85769800 r5:853e0c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85685500 INFO: task kworker/0:590:6786 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b8fc4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:6787 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:6787 tgid:6787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed661d84 r8:00000002 r7:60000013 r6:ed661d8c r5:853e1800 r4:853e1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed661e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685a80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f347000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4bf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596e38c r4:8596e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596e38c r4:85769880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e1800 r8:857698ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769880 r8:8027f5e8 r7:ed65de60 r6:85769900 r5:853e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed661fb0 to 0xed661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85685880 INFO: task kworker/0:591:6787 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b9366000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:6789 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:6789 tgid:6789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed669d84 r8:00000002 r7:60000013 r6:ed669d8c r5:857e4800 r4:857e4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed669e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685d00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f349000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed50d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596e78c r4:8596e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596e78c r4:85769980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85769980 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85685500 INFO: task kworker/0:592:6789 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b9366000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed51b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596df8c r4:8596dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596df8c r4:85769a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e6c00 r8:85769aac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:82ac11e4 r4:eaeb9dc0 r4:00000000 r5:00001000 r4:ed35d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:6793 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:6793 tgid:6793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed66dd84 r8:00000002 r7:60000113 r6:ed66dd8c r5:853f0000 r4:853f0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed66de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f34d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed52b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596ef8c r4:8596ec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596ef8c r4:85769b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f0000 r8:85769bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769b80 r8:8027f5e8 r7:ed65de60 r6:85769c00 r5:853f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed66dfb0 to 0xed66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85685f80 INFO: task kworker/0:594:6793 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: b9aba000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:6795 tgid:6795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed671d84 r8:00000002 r7:60000113 r6:ed671d8c r5:853f0c00 r4:853f0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed671e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c11c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f351000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed54b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596eb8c r4:8596e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596eb8c r4:85769c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f0c00 r8:85769cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769c80 r8:8027f5e8 r7:ed65de60 r6:85769d00 r5:853f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed671fb0 to 0xed671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 INFO: task kworker/0:596:6798 blocked for more than 471 seconds. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c1480 r5:8596f78c r4:8596f400 5fa0: 00000000 00000000 00000000 00000000 r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed679d84 r8:00000002 r7:60000013 r6:ed679d8c r5:853f2400 r4:853f2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed679e08 r5:00001000 r4:ed563000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853f2400 r8:85769eac r7:82804d40 r6:dddced80 r5:dddceda0 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed67de08 r5:00001000 r4:ed6a9000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000000 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918888 r9:ed685d84 r8:00000002 r7:60000113 r6:ed685d8c r5:853f3c00 r5:00001000 r4:ed58b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r5:00001000 r4:ed35d000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:ed5af000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:6808 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:6808 tgid:6808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed68dd84 r8:00000002 r7:60000113 r6:ed68dd8c r5:853f5400 r4:853f5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed68de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c1940 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f35b000 r5:00001000 r4:ed5bf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8597c38c r4:85869280 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85a35f8c r4:85a35c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed691e08 r5:00001000 r4:ed695000 Exception stack(0xed691fb0 to 0xed691ff8) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:ed6c1000 r7:dddced80 r6:83018000 r5:8597d78c r4:85869480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85869480 r8:8027f5e8 r7:ed67de60 r6:85869500 r5:853f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed681fb0 to 0xed681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c1880 INFO: task kworker/0:603:6812 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bac1e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:84bf9700 r4:859d0000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c1e00 r5:00001000 r4:ed6b5000 r5:8597cf8c r4:8597cc00 dfa0: 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:85a35f8c r4:85a35c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:ed721000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r4:eaeb9dc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:6819 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed6cd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r10:82918888 r9:ed6d5d84 r8:00000002 r7:60000113 r6:ed6d5d8c r5:859d2400 r5:00001000 r4:ed6d9000 r7:dddced80 r6:83018000 r5:8597df8c r4:85869880 r4:85996100 9d20: bbc70000 ed2f3000 00000001 80239b98 7f383000 00000001 r5:85a35f8c r4:85a35c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:6823 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:6823 tgid:6823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed6e1d84 r8:00000002 r7:60000113 r6:ed6e1d8c r5:859d3000 r4:859d3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859d3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6e1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85996280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f36b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6e5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597e78c r4:8597e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597e78c r4:85869980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d3000 r8:858699ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85869980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85869980 r8:8027f5e8 r7:ed6bde60 r6:85869a00 r5:859d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6e1fb0 to 0xed6e1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 task:kworker/0:609 state:D stack:0 pid:6825 tgid:6825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed6edd84 r8:00000002 r7:60000113 r6:ed6edd8c r5:859d3c00 r4:859d3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859d3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6ede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85996380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f36d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6f1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597e38c r4:8597e000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597e38c r4:85869a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d3c00 r8:85869aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85869a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85869a80 r8:8027f5e8 r7:ed6bde60 r6:85869b00 r5:859d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6edfb0 to 0xed6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85996640 INFO: task kworker/0:609:6825 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bc618000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:ed6f9d84 r8:00000002 r7:60000013 r6:ed6f9d8c r5:859d4800 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed6fd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8597ef8c r4:85869b80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bc618000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:611:6829 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:611 state:D stack:0 pid:6829 tgid:6829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed705d84 r8:00000002 r7:60000013 r6:ed705d8c r5:859d5400 r4:859d5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859d5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed705e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85996680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f371000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed709000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597eb8c r4:8597e800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597eb8c r4:85869c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d5400 r8:85869cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85869c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85869c80 r8:8027f5e8 r7:ed6bde60 r6:85869d00 r5:859d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed705fb0 to 0xed705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85996700 INFO: task kworker/0:611:6829 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 9d20: bcc3d000 ed2f3000 00000001 80239b98 7f383000 00000001 r4:82ac11e4 r4:eaeb9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:6830 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:6830 tgid:6830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed711d84 r8:00000002 r7:60000013 r6:ed711d8c r5:859d6000 r4:859d6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859d6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed711e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85996800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f373000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed715000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597f38c r4:8597f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597f38c r4:85869d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d6000 r8:85869dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85869d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85869d80 r8:8027f5e8 r7:ed6bde60 r6:85869e00 r5:859d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed711fb0 to 0xed711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85996400 INFO: task kworker/0:612:6830 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bcc3d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:6833 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:6833 tgid:6833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed71dd84 r8:00000002 r7:60000013 r6:ed71dd8c r5:859d6c00 r4:859d6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5f1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3db8c r4:85a3d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3db8c r4:85869e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d6c00 r8:85869eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85869e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85869e80 r8:8027f5e8 r7:ed6bde60 r6:85869f00 r5:859d6c00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed72d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:859d8000 r8:85869fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85996c80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f379000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed739000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597fb8c r4:8597f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597fb8c r4:859a7080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d8c00 r8:859a70ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a7080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a7080 r8:8027f5e8 r7:ed71de60 r6:859a7100 r5:859d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed729fb0 to 0xed729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85996b40 INFO: task kworker/0:615:6837 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bd698000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed745000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85a3c78c r4:859a7180 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bd698000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:6840 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:6840 tgid:6840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed735d84 r8:00000002 r7:60000113 r6:ed735d8c r5:859da400 r4:859da400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859da400 r4:82918884 r4:00000000 r4:00000000 r5:00001000 r4:ed751000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a3cb8c r4:859a7280 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:00000000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) Not tainted 6.15.0-syzkaller #0 r4:859dbc00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ad6c0 r5:00001000 r4:ed43d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:6849 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:6849 tgid:6849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed74dd84 r8:00000002 r7:60000013 r6:ed74dd8c r5:85856c00 r4:85856c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85856c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed74de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ad8c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85856c00 r7:00000000 r6:83018000 r5:00001000 r4:7f389000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4dd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3d38c r4:85a3d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3d38c r4:859a7400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85856c00 r8:859a742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a7400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a7400 r8:8027f5e8 r7:ed71de60 r6:85886180 r5:85856c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed74dfb0 to 0xed74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ad740 INFO: task kworker/0:619:6849 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bdc02000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:ed75dd84 r8:00000002 r7:60000013 r6:ed75dd8c r5:85853c00 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed4fb000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ad680 INFO: task kworker/0:620:6851 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: be393000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed611000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bea74000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed601000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3df8c r4:85a3dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3df8c r4:859a7580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85856000 r8:859a75ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a7580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a7580 r8:8027f5e8 r7:ed771e60 r6:85886300 r5:85856000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed775fb0 to 0xed775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ad9c0 INFO: task kworker/0:622:6855 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bea74000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 r4:eaeb9dc0 r5:00001000 r4:ed35d000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Not tainted 6.15.0-syzkaller #0 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed62b000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:6859 tgid:6859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed77dd84 r8:00000002 r7:60000113 r6:ed77dd8c r5:85850c00 r4:85850c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85850c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed77de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ade80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85850c00 r7:00000000 r6:83018000 r5:00001000 r4:7f393000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed61d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3e78c r4:85a3e400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3e78c r4:859a7680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85850c00 r8:859a76ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a7680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a7680 r8:8027f5e8 r7:ed779e60 r6:85886400 r5:85850c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed77dfb0 to 0xed77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859adc40 INFO: task kworker/0:624:6859 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: bf478000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a35f8c r4:85a35c00 r4:848b5900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed789e08 r5:00001000 r4:ed7a1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85a3f78c r4:859a7700 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:626:6864 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:626 state:D stack:0 pid:6864 tgid:6864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed795d84 r8:00000002 r7:60000113 r6:ed795d8c r5:847c0c00 r4:847c0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c0c00 r4:82918884 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed63b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:859a7780 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: bf478000 ed2f3000 00000001 80239b98 7f383000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:847c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f399000 r5:00001000 r4:ed791000 r7:dddced80 r6:83018000 r5:85a3f38c r4:859a7800 Exception stack(0xed7a9fb0 to 0xed7a9ff8) r4:859ad140 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:628:6868 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:628 state:D stack:0 pid:6868 tgid:6868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed7b1d84 r8:00000002 r7:60000113 r6:ed7b1d8c r5:847c0000 r4:847c0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7b1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a23c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f3a1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7cd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3ff8c r4:85a3fc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3ff8c r4:859a7880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c0000 r8:859a78ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a7880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a7880 r8:8027f5e8 r7:ed789e60 r6:85886600 r5:847c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7b1fb0 to 0xed7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a20c0 INFO: task kworker/0:628:6868 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c02e4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:629:6869 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:629 state:D stack:0 pid:6869 tgid:6869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed76dd84 r8:00000002 r7:60000013 r6:ed76dd8c r5:859dd400 r4:859dd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859dd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 r5:00001000 r4:ed7b5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a3fb8c r4:859a7900 Exception stack(0xed76dfb0 to 0xed76dff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7c1000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3eb8c r4:859a7a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859db000 r8:859a7a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a7a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a7a00 r8:8027f5e8 r7:ed7b1e60 r6:859a7a80 r5:859db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7adfb0 to 0xed7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a23c0 INFO: task kworker/0:630:6872 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c0809000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859de000 r4:82918884 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed7d9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a4478c r4:859a7b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859de000 r8:859a7b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a7b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a7b00 r8:8027f5e8 r7:ed7b1e60 r6:859a7b80 r5:859de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7bdfb0 to 0xed7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a2300 INFO: task kworker/0:631:6874 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c0809000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r5:85a35f8c r4:85a35c00 9fa0: 00000000 00000000 00000000 00000000 r4:859dec00 r4:00000000 r4:00000000 r5:00001000 r4:ed7fd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a44f8c r4:859a7c00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:6877 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:6877 tgid:6877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed7d5d84 r8:00000002 r7:60000113 r6:ed7d5d8c r5:859dc800 r4:859dc800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859dc800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a2580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f3a5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7e5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4438c r4:85a44000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4438c r4:859a7d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859dc800 r8:859a7d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a7d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a7d00 r8:8027f5e8 r7:ed781e60 r6:859a7d80 r5:859dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7d5fb0 to 0xed7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a2580 INFO: task kworker/0:633:6877 is blocked on a mutex likely owned by task kworker/1:370:4428. r4:00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:ed7e1d84 r8:00000002 r7:60000113 r6:ed7e1d8c r5:859e8000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed7f1000 r5:85a44b8c r4:85a44800 r10:61c88647 r9:859e8000 r8:859a7e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 task:kworker/0:635 state:D stack:0 pid:6881 tgid:6881 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7ede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a2bc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3ab000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed809000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4538c r4:85a45000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4538c r4:859a7f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e8c00 r8:859a7f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a7f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a7f00 r8:8027f5e8 r7:ed781e60 r6:859a7f80 r5:859e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7edfb0 to 0xed7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a2a40 INFO: task kworker/0:635:6881 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c1620000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7f9e08 r5:00001000 r4:ed815000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85a4578c r4:859bd000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a2cc0 INFO: task kworker/0:636:6884 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c19d8000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:6886 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed839000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r4:859eb000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed821000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:859eb000 r8:859bd22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a2e40 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:00000001 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:639:6889 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:639 state:D stack:0 pid:6889 tgid:6889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed81dd84 r8:00000002 r7:60000013 r6:ed81dd8c r5:859ebc00 r4:859ebc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859ebc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed81de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c3040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f3b1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed82d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a45f8c r4:85a45c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a45f8c r4:859bd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ebc00 r8:859bd32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bd300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bd300 r8:8027f5e8 r7:ed811e60 r6:859bd380 r5:859ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed81dfb0 to 0xed81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85996d40 INFO: task kworker/0:639:6889 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c240c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a35f8c r4:85a35c00 r4:848b5900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed851000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:859ec800 r8:859bd42c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed829fb0 to 0xed829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859c3240 INFO: task kworker/0:640:6892 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c2967000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed845000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a4678c r4:859bd500 INFO: task kworker/0:641:6894 is blocked on a mutex likely owned by task kworker/1:370:4428. r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed875000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859c3380 INFO: task kworker/0:642:6897 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c368d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:6898 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:6898 tgid:6898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed865d84 r8:00000002 r7:60000013 r6:ed865d8c r5:847c1800 r4:847c1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed865e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c3540 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f3b9000 r5:00001000 r4:ed85d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a46f8c r4:85a46c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a46f8c r4:859bd700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:848b5900 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:6899 tgid:6899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed86dd84 r8:00000002 r7:60000113 r6:ed86dd8c r5:847c3000 r4:847c3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed86de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c3880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f3bb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed869000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4778c r4:85a47400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4778c r4:859bd780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c3000 r8:859bd7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bd780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bd780 r8:8027f5e8 r7:ed835e60 r6:85886700 r5:847c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed86dfb0 to 0xed86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859c3740 INFO: task kworker/0:644:6899 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:847c4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed879e08 r5:00001000 r4:ed885000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4738c r4:859bd800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c4800 r8:859bd82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bd800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bd800 r8:8027f5e8 r7:ed835e60 r6:85886780 r5:847c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed879fb0 to 0xed879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859c3740 INFO: task kworker/0:645:6901 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c3d83000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed891000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed881fb0 to 0xed881ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:847c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3c9000 r5:00001000 r4:ed8d1000 r7:dddced80 r6:83018000 r5:85a50f8c r4:859bd900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:648:6907 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:648 state:D stack:0 pid:6907 tgid:6907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed8a9d84 r8:00000002 r7:60000113 r6:ed8a9d8c r5:847c6000 r4:847c6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8a9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c3cc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f3c3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8a1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a50b8c r4:85a50800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a50b8c r4:859bd980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c6000 r8:859bd9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bd980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bd980 r8:8027f5e8 r7:ed895e60 r6:85886900 r5:847c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8a9fb0 to 0xed8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859c3d00 INFO: task kworker/0:648:6907 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c4f3a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed8b1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5078c r4:85a50400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5078c r4:859bda00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c3c00 r8:859bda2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bda00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bda00 r8:8027f5e8 r7:ed895e60 r6:85886980 r5:847c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8b9fb0 to 0xed8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859c3f00 INFO: task kworker/0:649:6909 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c4f3a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:650:6911 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:650 state:D stack:0 pid:6911 tgid:6911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed8c5d84 r8:00000002 r7:60000013 r6:ed8c5d8c r5:8583ec00 r4:8583ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8583ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8c5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c3e40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8583ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f3c7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5138c r4:85a51000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5138c r4:859bda80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583ec00 r8:859bdaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bda80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c4f3a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85859800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8dde08 r5:00001000 r4:ed8ed000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a51f8c r4:85a51c00 r7:dddced80 r6:83018000 r5:85a51f8c r4:859bdb00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a85240 r5:00001000 r4:ed8e1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a51b8c r4:85a51800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a51b8c r4:859bdb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85858000 r8:859bdbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bdb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bdb80 r8:8027f5e8 r7:ed8dde60 r6:85886b00 r5:85858000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8e9fb0 to 0xed8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a85100 INFO: task kworker/0:652:6915 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c515b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:6923 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:6923 tgid:6923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed8d9d84 r8:00000002 r7:60000113 r6:ed8d9d8c r5:8585a400 r5:8585a400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed267000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5238c r4:85a52000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5238c r4:859bdc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585a400 r8:859bdc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bdc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bdc00 r8:8027f5e8 r7:ed8dde60 r6:85886b80 r5:8585a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8d9fb0 to 0xed8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a858c0 INFO: task kworker/0:653:6923 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c57bb000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r4:848b5900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8585b000 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed201000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a53b8c r4:85a53800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8585b000 r8:859bdcac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:6925 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:6925 tgid:6925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed905d84 r8:00000002 r7:60000113 r6:ed905d8c r5:8585c800 r4:8585c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8585c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed905e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599b340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8585c800 r7:00000000 r6:83018000 r5:00001000 r4:7f33b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed11d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5338c r4:85a53000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5338c r4:859bdd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585c800 r8:859bdd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bdd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bdd00 r8:8027f5e8 r7:ed859e60 r6:85886c80 r5:8585c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed905fb0 to 0xed905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a854c0 INFO: task kworker/0:655:6925 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 Exception stack(0xeaeb9d28 to 0xeaeb9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r4:848b5900 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:6986 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:656 state:D stack:0 pid:6986 tgid:6986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed901d84 r8:00000002 r7:60000113 r6:ed901d8c r5:859f4800 r4:859f4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859f4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed901e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b78780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f573000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede33000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a55f8c r4:85a55c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a55f8c r4:859bdd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f4800 r8:859bddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bdd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bdd80 r8:8027f5e8 r7:ed859e60 r6:859bde00 r5:859f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed901fb0 to 0xed901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599b180 INFO: task kworker/0:656:6986 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) r4:84bf9700 Workqueue: events bpf_prog_free_deferred r10:82918888 r9:ed941d84 r8:00000002 r7:60000113 r6:ed941d8c r5:859f3c00 r4:859f3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859f3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed941e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599b5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3b9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2d7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a52f8c r4:85a52c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a52f8c r4:859bde80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f3c00 r8:859bdeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859bde80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859bde80 r8:8027f5e8 r7:ed901e60 r6:859bdf00 r5:859f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed941fb0 to 0xed941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599b280 INFO: task kworker/0:657:6988 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c6555000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859f2400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed4af000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5178c r4:85a51400 r7:dddced80 r6:83018000 r5:85a5178c r4:859bdf80 Exception stack(0xed949fb0 to 0xed949ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 INFO: task kworker/0:659:6995 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:6995 tgid:6995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed94dd84 r8:00000002 r7:60000113 r6:ed94dd8c r5:859f5400 r4:859f5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859f5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed94de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599b900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f3c3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a53f8c r4:85a53c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a53f8c r4:859a3080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f5400 r8:859a30ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a3080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a3080 r8:8027f5e8 r7:ed901e60 r6:859a3100 r5:859f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed94dfb0 to 0xed94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599b280 INFO: task kworker/0:659:6995 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c6cc8000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:6997 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:6997 tgid:6997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ed955d84 r8:00000002 r7:60000113 r6:ed955d8c r5:859f6000 r4:859f6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859f6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed955e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b38e40 r5:00001000 r4:edd3f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a54b8c r4:859a3180 Exception stack(0xed955fb0 to 0xed955ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) Not tainted 6.15.0-syzkaller #0 r4:859f3000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eddeb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a54f8c r4:859a3280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f3000 r8:859a32ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a3280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a3280 r8:8027f5e8 r7:ed901e60 r6:859a3300 r5:859f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeddc5fb0 to 0xeddc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b38ec0 INFO: task kworker/0:661:7213 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c7360000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eddf7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeddddfb0 to 0xeddddff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:7225 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:7225 tgid:7225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eddf5d84 r8:00000002 r7:60000113 r6:eddf5d8c r5:859f0000 r4:859f0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859f0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddf5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b78240 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f56b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede03000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5578c r4:85a55400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5578c r4:859a3480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f0000 r8:859a34ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a3480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a3480 r8:8027f5e8 r7:ed901e60 r6:859a3500 r5:859f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeddf5fb0 to 0xeddf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b78200 INFO: task kworker/0:663:7225 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c78ab000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ede0f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:665:7229 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:665 state:D stack:0 pid:7229 tgid:7229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ede0dd84 r8:00000002 r7:60000113 r6:ede0dd8c r5:859ee000 r4:859ee000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859ee000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede0de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b786c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f56f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede1b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a55b8c r4:85a55800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a55b8c r4:859a3680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ee000 r8:859a36ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a3680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a3680 r8:8027f5e8 r7:ed901e60 r6:859a3700 r5:859ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede0dfb0 to 0xede0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b78480 INFO: task kworker/0:665:7229 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c7d18000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 r4:eaeb9dc0 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ede27000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xede19fb0 to 0xede19ff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:7236 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:7236 tgid:7236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ede31d84 r8:00000002 r7:60000013 r6:ede31d8c r5:84931800 r4:84931800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r9:83018005 r8:84931800 r7:00000000 r6:83018000 r5:00001000 r4:7f6e7000 r5:00001000 r4:eda8b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ede53000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedd8dfb0 to 0xedd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b78e00 INFO: task kworker/0:668:7239 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c8419000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:7244 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:7244 tgid:7244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ede25d84 r8:00000002 r7:60000113 r6:ede25d8c r5:84930c00 r4:84930c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84930c00 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede25e08 r5:00001000 r4:ede6f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a56b8c r4:85a56800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:ede5dd84 r8:00000002 r7:60000113 r6:ede5dd8c r5:84933c00 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84933c00 r7:00000000 r6:83018000 r5:00001000 r4:7f583000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede7b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5738c r4:85a57000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5738c r4:859a3b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84933c00 r8:859a3bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a3b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a3b80 r8:8027f5e8 r7:ede31e60 r6:859a3c00 r5:84933c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede5dfb0 to 0xede5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b78440 INFO: task kworker/0:670:7246 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c86a7000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede79e08 r5:00001000 r4:ede87000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:672:7250 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:672 state:D stack:0 pid:7250 tgid:7250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ede85d84 r8:00000002 r7:60000113 r6:ede85d8c r5:84935400 r4:84935400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84935400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede85e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ad340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f587000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede93000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a57b8c r4:85a57800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a57b8c r4:859a3d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84935400 r8:859a3dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a3d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a3d80 r8:8027f5e8 r7:ede31e60 r6:859a3e00 r5:84935400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede85fb0 to 0xede85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ad3c0 INFO: task kworker/0:672:7250 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c8b11000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:673:7251 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r4:84936000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84936000 r7:00000000 r6:83018000 r5:00001000 r4:7f589000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede9f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5778c r4:85a57400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5778c r4:859a3e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84936000 r8:859a3eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a3e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a3e80 r8:8027f5e8 r7:ede31e60 r6:859a3f00 r5:84936000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede91fb0 to 0xede91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ad3c0 INFO: task kworker/0:673:7251 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c90ce000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:7253 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:7253 tgid:7253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ede9dd84 r8:00000002 r7:60000113 r6:ede9dd8c r5:84936c00 r4:84936c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84936c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede9de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84936c00 r7:00000000 r6:83018000 r5:00001000 r4:7f58d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edeb3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5fb8c r4:85b5f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5fb8c r4:859a3f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84936c00 r8:859a3fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859a3f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a3f80 r8:8027f5e8 r7:ede31e60 r6:85a8d000 r5:84936c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede9dfb0 to 0xede9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85862500 INFO: task kworker/0:674:7253 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c968c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:7260 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:7260 tgid:7260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ededdd84 r8:00000002 r7:60000113 r6:ededdd8c r5:84933000 r4:84933000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84933000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ededde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84933000 r7:00000000 r6:83018000 r5:00001000 r4:7f6df000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9d5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84857b8c r4:84857800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84857b8c r4:85a8d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84933000 r8:85a8d0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8d080 r8:8027f5e8 r7:ede31e60 r6:85a8d100 r5:84933000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xededdfb0 to 0xededdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858629c0 INFO: task kworker/0:675:7260 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c97f5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed35d000 r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:7455 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:7455 tgid:7455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edb5dd84 r8:00000002 r7:60000013 r6:edb5dd8c r5:859f9800 r4:859f9800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859f9800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb5de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f6e1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9ed000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485778c r4:84857400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a8d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8d180 r8:8027f5e8 r7:ede31e60 r6:85a8d200 r5:859f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb5dfb0 to 0xedb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85368840 INFO: task kworker/0:676:7455 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c9a45000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) Not tainted 6.15.0-syzkaller #0 r4:859fb000 r4:00000000 r9:83018005 r8:859fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f6e3000 r5:00001000 r4:eda45000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84854f8c r4:84854c00 r4:85a8d280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 r5:85a35f8c r4:85a35c00 r4:848b5900 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) Not tainted 6.15.0-syzkaller #0 r4:859f8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb65e08 r5:00001000 r4:eda5b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84854b8c r4:84854800 r7:dddced80 r6:83018000 r5:84854b8c r4:85a8d380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f8c00 r8:85a8d3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8d380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8d380 r8:8027f5e8 r7:ede31e60 r6:85a8d400 r5:859f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb65fb0 to 0xedb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85368e00 INFO: task kworker/0:678:7460 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: c9de4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:679 state:D stack:0 pid:7462 tgid:7462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edb69d84 r8:00000002 r7:60000013 r6:edb69d8c r5:859f8000 r4:859f8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859f8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a2d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f6e9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaa3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6038c r4:85a60000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6038c r4:85a8d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f8000 r8:85a8d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8d480 r8:8027f5e8 r7:ede31e60 r6:85a8d500 r5:859f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb69fb0 to 0xedb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:679:7462 is blocked on a mutex likely owned by task kworker/1:370:4428. 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:edb83000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a6078c r4:85a60400 r10:61c88647 r9:859fc800 r8:85a8d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a2c80 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:7465 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:681 state:D stack:0 pid:7465 tgid:7465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edb75d84 r8:00000002 r7:60000013 r6:edb75d8c r5:859fd400 r4:859fd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859fd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f6eb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edab5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a60b8c r4:85a60800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a60b8c r4:85a8d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fd400 r8:85a8d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8d680 r8:8027f5e8 r7:edb71e60 r6:85a8d700 r5:859fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb75fb0 to 0xedb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873080 INFO: task kworker/0:681:7465 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:edb79d84 r8:00000002 r7:60000013 r6:edb79d8c r5:859fa400 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edac9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85a60f8c r4:85a8d780 Exception stack(0xedb79fb0 to 0xedb79ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:7469 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:7469 tgid:7469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edb81d84 r8:00000002 r7:60000013 r6:edb81d8c r5:859fec00 r4:859fec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859fec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb81e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f6ef000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb19000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6138c r4:85a61000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6138c r4:85a8d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fec00 r8:85a8d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8d880 r8:8027f5e8 r7:edb71e60 r6:85a8d900 r5:859fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb81fb0 to 0xedb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873200 INFO: task kworker/0:683:7469 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edc97000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:7473 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:7473 tgid:7473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edbc5d84 r8:00000002 r7:60000113 r6:edbc5d8c r5:859fe000 r4:859fe000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859fe000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbc5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873a40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f6f3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb8b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a61b8c r4:85a61800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a61b8c r4:85a8da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fe000 r8:85a8daac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8da80 r8:8027f5e8 r7:edb95e60 r6:85a8db00 r5:859fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbc5fb0 to 0xedbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873800 INFO: task kworker/0:685:7473 is blocked on a mutex likely owned by task kworker/1:370:4428. r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebd0f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a6178c r4:85a8db80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae0c00 r8:85a8dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8db80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8db80 r8:8027f5e8 r7:edb95e60 r6:85a8dc00 r5:83ae0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbddfb0 to 0xedbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873240 INFO: task kworker/0:686:7475 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: caff4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:7478 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8585e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbf9e08 r5:00001000 r4:edbb7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a61f8c r4:85a61c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a61f8c r4:85a8dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585e000 r8:85a8dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8dc80 r8:8027f5e8 r7:edb95e60 r6:85886d00 r5:8585e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbf9fb0 to 0xedbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873c40 INFO: task kworker/0:687:7478 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: caff4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:edbfb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a6278c r4:85a8dd00 Exception stack(0xedc09fb0 to 0xedc09ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873c40 INFO: task kworker/0:688:7479 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cbacd000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc15000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a6238c r4:85a8dd80 r10:00000000 r9:85a8dd80 r8:8027f5e8 r7:edb95e60 r6:85886e00 r5:8585d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85368cc0 INFO: task kworker/0:689:7481 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cbd06000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) Not tainted 6.15.0-syzkaller #0 r4:85858c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc45e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc37000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a62b8c r4:85a8de00 Exception stack(0xedc45fb0 to 0xedc45ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:7486 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:7486 tgid:7486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edc55d84 r8:00000002 r7:60000113 r6:edc55d8c r5:85bb0c00 r4:85bb0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc55e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85764000 r9:83018005 r8:85bb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6fd000 r5:00001000 r4:edc47000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a62f8c r4:85a8de80 Exception stack(0xedc55fb0 to 0xedc55ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:7487 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:7487 tgid:7487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edc5dd84 r8:00000002 r7:60000113 r6:edc5dd8c r5:85bb1800 r4:85bb1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc5de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85764100 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f6ff000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc57000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6378c r4:85a63400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6378c r4:85a8df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb1800 r8:85a8df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8df00 r8:8027f5e8 r7:edb95e60 r6:85886f80 r5:85bb1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc5dfb0 to 0xedc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764140 INFO: task kworker/0:692:7487 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cc11e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85bb2400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc73000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a63b8c r4:85a63800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a63b8c r4:85a8df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb2400 r8:85a8dfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8df80 r8:8027f5e8 r7:edb95e60 r6:85bc4000 r5:85bb2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc6dfb0 to 0xedc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857642c0 INFO: task kworker/0:693:7489 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ccaac000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:7492 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:7492 tgid:7492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edcf9d84 r8:00000002 r7:60000013 r6:edcf9d8c r5:85bb4800 r4:85bb4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:edcb9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a63f8c r4:85a63c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85bb4800 r8:8568802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcf9fb0 to 0xedcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764400 INFO: task kworker/0:694:7492 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ccaac000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcfde08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edca5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84855b8c r4:85688080 Exception stack(0xedcfdfb0 to 0xedcfdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857644c0 INFO: task kworker/0:695:7493 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ccd0b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bf9700 Workqueue: events bpf_prog_free_deferred r5:83ae2400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edd39000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a68f8c r4:85a68c00 r7:dddced80 r6:83018000 r5:85a68f8c r4:85688100 r10:00000000 r9:85688100 r8:8027f5e8 r7:edcf9e60 r6:85688180 r5:83ae2400 INFO: task kworker/0:696:7495 is blocked on a mutex likely owned by task kworker/1:370:4428. Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:82ac11e4 r4:eaeb9dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edcd7000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6878c r4:85688200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb3c00 r8:8568822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688200 r8:8027f5e8 r7:edc51e60 r6:85bc4180 r5:85bb3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd05fb0 to 0xedd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764280 INFO: task kworker/0:697:7497 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cd360000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:7499 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:7499 tgid:7499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edd29d84 r8:00000002 r7:60000113 r6:edd29d8c r5:85bb6c00 r4:85bb6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd29e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85764ac0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bb6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f70b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edced000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a68b8c r4:85a68800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a68b8c r4:85688280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85688280 r8:8027f5e8 r7:edc51e60 r6:85bc4200 r5:85bb6c00 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a6838c r4:85a68000 r4:85688300 Exception stack(0xedd4dfb0 to 0xedd4dff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cd8b3000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:700:7503 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:700 state:D stack:0 pid:7503 tgid:7503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edd75d84 r8:00000002 r7:60000013 r6:edd75d8c r5:85bb5400 r4:85bb5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb93c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bb5400 r7:00000000 r6:83018000 r5:00001000 r4:7f723000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede45000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6a38c r4:85a6a000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6a38c r4:85688380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb5400 r8:856883ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688380 r8:8027f5e8 r7:edc51e60 r6:85bc4300 r5:85bb5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd75fb0 to 0xedd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764cc0 INFO: task kworker/0:700:7503 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cdb4b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd57000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:83ae3c00 r8:8568842c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r4:848b5900 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) Not tainted 6.15.0-syzkaller #0 task:kworker/0:702 state:D stack:0 pid:7507 tgid:7507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edda1d84 r8:00000002 r7:60000113 r6:edda1d8c r5:83ae4800 r4:83ae4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ae4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edda1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85764f40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ae4800 r7:00000000 r6:83018000 r5:00001000 r4:7f713000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd6f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6938c r4:85a69000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6938c r4:85688500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae4800 r8:8568852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688500 r8:8027f5e8 r7:edd75e60 r6:85688580 r5:83ae4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedda1fb0 to 0xedda1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764d80 INFO: task kworker/0:702:7507 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ce27b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ede1d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85a69b8c r4:85688600 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6a78c r4:85a6a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6a78c r4:85688700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae5400 r8:8568872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688700 r8:8027f5e8 r7:edd75e60 r6:85688780 r5:83ae5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede21fb0 to 0xede21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb93c0 INFO: task kworker/0:704:7516 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ce57a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:705:7519 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:705 state:D stack:0 pid:7519 tgid:7519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ede75d84 r8:00000002 r7:60000013 r6:ede75d8c r5:83ae6c00 r4:83ae6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ae6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ede97000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6b38c r4:85a6b000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:83ae6c00 r8:8568882c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ce949000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:7520 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:7520 tgid:7520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eddadd84 r8:00000002 r7:60000013 r6:eddadd8c r5:83ae3000 r4:83ae3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ae3000 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddade08 r4:00000000 r5:00001000 r4:ede51000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6af8c r4:85a6ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6af8c r4:85688900 r10:61c88647 r9:83ae3000 r8:8568892c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000001 INFO: task kworker/0:707:7522 blocked for more than 473 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbe5e08 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb9980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ae1800 r7:00000000 r6:83018000 r5:00001000 r4:7f729000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede71000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6ab8c r4:85a6a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6ab8c r4:85688a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae1800 r8:85688a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688a00 r8:8027f5e8 r7:ede75e60 r6:85688a80 r5:83ae1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbe5fb0 to 0xedbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb9880 INFO: task kworker/0:707:7522 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cf0d3000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:708:7526 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r4:83ae0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede81e08 r5:00001000 r4:edead000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6b78c r4:85a6b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6b78c r4:85688b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae0000 r8:85688b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688b00 r8:8027f5e8 r7:ede75e60 r6:85688b80 r5:83ae0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede81fb0 to 0xede81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb9b40 INFO: task kworker/0:708:7526 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cf443000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:848b5900 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:859fbc00 r4:82918884 r4:00000000 r5:00001000 r4:edebd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85688c00 r4:85bb9b40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cf443000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) task:kworker/0:710 state:D stack:0 pid:7529 tgid:7529 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edf31000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a70f8c r4:85a70c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a70f8c r4:85688d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84960000 r8:85688d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688d00 r8:8027f5e8 r7:ee0b5e60 r6:85688d80 r5:84960000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede8dfb0 to 0xede8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb9cc0 INFO: task kworker/0:710:7529 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cf818000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 r4:82ac11e4 r5:00001000 r4:ed35d000 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 task:kworker/0:711 state:D stack:0 pid:7532 tgid:7532 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eded1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84960c00 r8:85688e2c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:edeed000 r10:00000000 r9:85688f00 r8:8027f5e8 r7:ede8de60 r6:85688f80 r5:84961800 Exception stack(0xee0c1fb0 to 0xee0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85883180 INFO: task kworker/0:712:7534 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cfd3b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edf05000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84962400 r8:854e302c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bf9700 r4:84963000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfaa1000 r10:61c88647 r9:84963000 r8:854e312c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d0116000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:715:7540 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:715 state:D stack:0 pid:7540 tgid:7540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee0c9d84 r8:00000002 r7:60000113 r6:ee0c9d8c r5:84963c00 r4:84963c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84963c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf49000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7038c r4:85a70000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7038c r4:854e3200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963c00 r8:854e322c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3200 r10:00000000 r9:854e3200 r8:8027f5e8 r7:ee0bde60 r6:854e3280 r5:84963c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:84964800 r4:82918884 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85883840 r5:00001000 r4:dfb0f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a71f8c r4:85a71c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a71f8c r4:854e3300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84964800 r8:854e332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3300 r8:8027f5e8 r7:ee0bde60 r6:854e3380 r5:84964800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0d1fb0 to 0xee0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85883680 INFO: task kworker/0:716:7545 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d06ef000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84965400 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfb5b000 r10:61c88647 r9:84965400 r8:854e342c r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84966000 r7:00000000 r6:83018000 r5:00001000 r4:7f78b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edba1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a71b8c r4:85a71800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a71b8c r4:854e3500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84966000 r8:854e352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3500 r8:8027f5e8 r7:ee0cde60 r6:854e3580 r5:84966000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda1dfb0 to 0xeda1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85883740 INFO: task kworker/0:718:7547 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d12d7000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:7549 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:7549 tgid:7549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84966c00 r4:82918884 r9:83018005 r8:84966c00 r7:00000000 r6:83018000 r5:00001000 r4:7f78f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:719:7549 is blocked on a mutex likely owned by task kworker/1:370:4428. r4:eaeb9dc0 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85c10000 r4:82918884 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbfd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a438c r4:849a4000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849a438c r4:854e3700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c10000 r8:854e372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3700 r8:8027f5e8 r7:eda21e60 r6:854e3780 r5:85c10000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee15dfb0 to 0xee15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb8cc0 INFO: task kworker/0:720:7654 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d1737000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:ee17dd84 r8:00000002 r7:60000113 r6:ee17dd8c r5:85c14800 r4:00000000 r4:00000000 r5:00001000 r4:edd45000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:849a3b8c r4:849a3800 r4:854e3800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c13c00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85c13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f793000 r5:00001000 r4:edcbf000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854e3900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589a240 INFO: task kworker/0:722:7659 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d1db4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:7661 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:7661 tgid:7661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee185d84 r8:00000002 r7:60000013 r6:ee185d8c r5:85c15400 r4:85c15400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edcf3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:849a378c r4:854e3a00 Exception stack(0xee185fb0 to 0xee185ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda25e08 r4:00000000 r5:00001000 r4:edd7b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a2b8c r4:849a2800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849a2b8c r4:854e3b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c16c00 r8:854e3b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3b00 r8:8027f5e8 r7:ee17de60 r6:854e3b80 r5:85c16c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda25fb0 to 0xeda25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589a600 INFO: task kworker/0:724:7664 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d2382000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eddcd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:849a238c r4:854e3c00 Exception stack(0xee179fb0 to 0xee179ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:726:7667 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r4:85c13000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee189e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589ac80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c13000 r7:00000000 r6:83018000 r5:00001000 r4:7f79f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede4f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8438c r4:85c84000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8438c r4:854e3d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c13000 r8:854e3d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3d00 r8:8027f5e8 r7:ee179e60 r6:854e3d80 r5:85c13000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee189fb0 to 0xee189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589ab00 INFO: task kworker/0:726:7667 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d2b96000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:7670 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:7670 tgid:7670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee191d84 r8:00000002 r7:60000113 r6:ee191d8c r5:85c12400 r4:85c12400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c12400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee191e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589aa80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c12400 r7:00000000 r6:83018000 r5:00001000 r4:7f79d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede29000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a338c r4:849a3000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849a338c r4:854e3e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c12400 r8:854e3e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3e00 r8:8027f5e8 r7:ee189e60 r6:854e3e80 r5:85c12400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee191fb0 to 0xee191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589ab80 INFO: task kworker/0:727:7670 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d2b96000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r5:85c10c00 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee195e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589ae00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7a1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede89000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8478c r4:85c84400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8478c r4:854e3f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c10c00 r8:854e3f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3f00 r8:8027f5e8 r7:ee189e60 r6:854e3f80 r5:85c10c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee195fb0 to 0xee195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589ad00 INFO: task kworker/0:728:7672 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d2fb3000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:729:7674 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r4:85c11800 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85c11800 r7:00000000 r6:83018000 r5:00001000 r4:7f7a3000 r5:00001000 r4:edebf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85bbc000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:730:7676 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:730 state:D stack:0 pid:7676 tgid:7676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee19dd84 r8:00000002 r7:60000113 r6:ee19dd8c r5:84a00000 r4:84a00000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a00000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee19de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc3380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a00000 r7:00000000 r6:83018000 r5:00001000 r4:7f7a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf6f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8578c r4:85c85400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8578c r4:85bbc100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a00000 r8:85bbc12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc100 r8:8027f5e8 r7:ee199e60 r6:85bbc180 r5:84a00000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee19dfb0 to 0xee19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589ae80 INFO: task kworker/0:730:7676 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d357d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:731:7677 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:731 state:D stack:0 pid:7677 tgid:7677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:84a00c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee18de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc3000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7a5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edefb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8538c r4:85c85000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8538c r4:85bbc200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a00c00 r8:85bbc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc200 r8:8027f5e8 r7:ee19de60 r6:85bbc280 r5:84a00c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee18dfb0 to 0xee18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3100 INFO: task kworker/0:731:7677 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d3807000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1a1e08 r5:00001000 r4:edf55000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bf9700 r10:82918888 r9:ee1a9d84 r8:00000002 r7:60000113 r6:ee1a9d8c r5:84a02400 r5:00001000 r4:ee01b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8638c r4:85c86000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8638c r4:85bbc400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a02400 r8:85bbc42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc400 r8:8027f5e8 r7:ee19de60 r6:85bbc480 r5:84a02400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1a9fb0 to 0xee1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3400 INFO: task kworker/0:733:7682 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84a03000 r4:82918884 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:edf8f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3700 INFO: task kworker/0:734:7684 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d3bcc000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:7686 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:735 state:D stack:0 pid:7686 tgid:7686 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1b1e08 r9:83018005 r8:84a03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7ad000 r5:00001000 r4:edfbf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee1b1fb0 to 0xee1b1ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:736:7688 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:736 state:D stack:0 pid:7688 tgid:7688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1b5d84 r8:00000002 r7:60000013 r6:ee1b5d8c r5:84a04800 r4:84a04800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a04800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1b5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc38c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a04800 r7:00000000 r6:83018000 r5:00001000 r4:7f7af000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfef000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8678c r4:85c86400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8678c r4:85bbc700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a04800 r8:85bbc72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc700 r8:8027f5e8 r7:ee1a9e60 r6:85bbc780 r5:84a04800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1b5fb0 to 0xee1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc37c0 INFO: task kworker/0:736:7688 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d40e7000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:737 state:D stack:0 pid:7690 tgid:7690 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1b9e08 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ee09b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8738c r4:85c87000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a05400 r8:85bbc82c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xee1b9fb0 to 0xee1b9ff8) r4:85bc3880 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 r4:eaeb9dc0 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85a35f8c r4:85a35c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:738 state:D stack:0 pid:7691 tgid:7691 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918888 r9:ee1a5d84 r8:00000002 r7:60000113 r6:ee1a5d8c r5:84a06000 r4:84a06000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a06000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc3d80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a06000 r7:00000000 r6:83018000 r5:00001000 r4:7f7b5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee07b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c86f8c r4:85c86c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c86f8c r4:85bbc900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a06000 r8:85bbc92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc900 r8:8027f5e8 r7:ee1b9e60 r6:85bbc980 r5:84a06000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1a5fb0 to 0xee1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3880 INFO: task kworker/0:738:7691 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d4a80000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a06c00 r4:82918884 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ee143000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85c87b8c r4:85bbca00 Exception stack(0xee1bdfb0 to 0xee1bdff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:740:7696 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:740 state:D stack:0 pid:7696 tgid:7696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1c1d84 r8:00000002 r7:60000113 r6:ee1c1d8c r5:85c28000 r4:85c28000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c28000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1c1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589a1c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c28000 r7:00000000 r6:83018000 r5:00001000 r4:7f7b9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee12b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8778c r4:85c87400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8778c r4:85bbcb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c28000 r8:85bbcb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbcb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbcb00 r8:8027f5e8 r7:ee1bde60 r6:85bbcb80 r5:85c28000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1c1fb0 to 0xee1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3f40 INFO: task kworker/0:740:7696 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d4a80000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) r4:84bf9700 task:kworker/0:741 state:D stack:0 pid:7699 tgid:7699 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599d340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c29800 r7:00000000 r6:83018000 r5:00001000 r4:7f7bf000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1d7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c87f8c r4:85c87c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c87f8c r4:85bbcc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c29800 r8:85bbcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbcc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbcc00 r8:8027f5e8 r7:ee1bde60 r6:85bbcc80 r5:85c29800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1c9fb0 to 0xee1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d100 INFO: task kworker/0:741:7699 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d4d46000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:742:7700 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:742 state:D stack:0 pid:7700 tgid:7700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1cdd84 r8:00000002 r7:60000113 r6:ee1cdd8c r5:85c2a400 r4:85c2a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee21f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c94f8c r4:85c94c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85bbcd00 Exception stack(0xee1cdfb0 to 0xee1cdff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1c5e08 r5:00001000 r4:ee1e3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c9438c r4:85c94000 r4:85bbce00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d440 INFO: task kworker/0:743:7704 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d5342000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:7705 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:7705 tgid:7705 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1e1e08 r5:00001000 r4:ee1ef000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 r4:848b5900 Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:61c88647 r9:85c2c800 r8:85c4402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44000 r8:8027f5e8 r7:ee1cde60 r6:85c44080 r5:85c2c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1edfb0 to 0xee1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599da40 INFO: task kworker/0:745:7708 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d5c98000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:746:7710 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:746 state:D stack:0 pid:7710 tgid:7710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee205d84 r8:00000002 r7:60000113 r6:ee205d8c r5:85c2d400 r4:85c2d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c2d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee205e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599d900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f7c7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee207000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9538c r4:85c95000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9538c r4:85c44100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c2d400 r8:85c4412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44100 r8:8027f5e8 r7:ee1cde60 r6:85c44180 r5:85c2d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee205fb0 to 0xee205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d8c0 INFO: task kworker/0:746:7710 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d5c98000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:7712 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:747 state:D stack:0 pid:7712 tgid:7712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee211d84 r8:00000002 r7:60000113 r6:ee211d8c r5:85c2e000 r4:85c2e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c2e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee211e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599db40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f7c9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee213000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9578c r4:85c95400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9578c r4:85c44200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c2e000 r8:85c4422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44200 r8:8027f5e8 r7:ee1cde60 r6:85c44280 r5:85c2e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee211fb0 to 0xee211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d440 INFO: task kworker/0:747:7712 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d613e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:7714 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:7714 tgid:7714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1f9d84 r8:00000002 r7:60000113 r6:ee1f9d8c r5:85c28c00 r4:85c28c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c28c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1f9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f76f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c95b8c r4:85c95800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c95b8c r4:85c44300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c28c00 r8:85c4432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44300 r8:8027f5e8 r7:ee1cde60 r6:85c44380 r5:85c28c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1f9fb0 to 0xee1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d440 INFO: task kworker/0:748:7714 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d613e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:7715 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:7715 tgid:7715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee231d84 r8:00000002 r7:60000113 r6:ee231d8c r5:85248000 r4:85248000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85248000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee231e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599de40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85248000 r7:00000000 r6:83018000 r5:00001000 r4:7f7cd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee227000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c95f8c r4:85c95c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c95f8c r4:85c44400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85248000 r8:85c4442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44400 r8:8027f5e8 r7:ee1f9e60 r6:85c44480 r5:85248000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee231fb0 to 0xee231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599df80 INFO: task kworker/0:749:7715 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d634e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:750:7717 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:750 state:D stack:0 pid:7717 tgid:7717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee235d84 r8:00000002 r7:60000113 r6:ee235d8c r5:85249800 r4:85249800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85249800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee235e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848bab80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85249800 r7:00000000 r6:83018000 r5:00001000 r4:7f773000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda15000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c96b8c r4:85c96800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c96b8c r4:85c44500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85249800 r8:85c4452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44500 r8:8027f5e8 r7:ee1f9e60 r6:85c44580 r5:85249800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee235fb0 to 0xee235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599dcc0 INFO: task kworker/0:750:7717 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d634e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:751:7719 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:751 state:D stack:0 pid:7719 tgid:7719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee23dd84 r8:00000002 r7:60000013 r6:ee23dd8c r5:85bb0000 r4:85bb0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee23de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1fc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f771000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed95b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9678c r4:85c96400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9678c r4:85c44600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb0000 r8:85c4462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44600 r8:8027f5e8 r7:ee235e60 r6:85bc4400 r5:85bb0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee23dfb0 to 0xee23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599db00 INFO: task kworker/0:751:7719 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d637c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:7721 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:7721 tgid:7721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee245d84 r8:00000002 r7:60000013 r6:ee245d8c r5:85c20000 r4:85c20000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c20000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee245e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c20000 r7:00000000 r6:83018000 r5:00001000 r4:7f7d1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee259000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c96f8c r4:85c96c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c96f8c r4:85c44680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c20000 r8:85c446ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44680 r8:8027f5e8 r7:ee235e60 r6:85bc4480 r5:85c20000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee245fb0 to 0xee245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ba900 INFO: task kworker/0:752:7721 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d6b41000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:753:7724 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:753 state:D stack:0 pid:7724 tgid:7724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee21dd84 r8:00000002 r7:60000113 r6:ee21dd8c r5:8524a400 r4:8524a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee21de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524a400 r7:00000000 r6:83018000 r5:00001000 r4:7f77f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee157000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9638c r4:85c96000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9638c r4:85c44700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524a400 r8:85c4472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44700 r8:8027f5e8 r7:ee245e60 r6:85c44780 r5:8524a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee21dfb0 to 0xee21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53080 INFO: task kworker/0:753:7724 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d6b41000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:7726 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee24dd84 r8:00000002 r7:60000013 r6:ee24dd8c r5:8524b000 r4:8524b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee24de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524b000 r7:00000000 r6:83018000 r5:00001000 r4:7f7cf000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee22d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9738c r4:85c97000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9738c r4:85c44800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524b000 r8:85c4482c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44800 r8:8027f5e8 r7:ee245e60 r6:85c44880 r5:8524b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee24dfb0 to 0xee24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53300 INFO: task kworker/0:754:7726 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d6b41000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:755:7728 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:7728 tgid:7728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee255d84 r8:00000002 r7:60000013 r6:ee255d8c r5:8524bc00 r4:8524bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee255e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f7e3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca138c r4:85ca1000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca138c r4:85c44900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524bc00 r8:85c4492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44900 r8:8027f5e8 r7:ee245e60 r6:85c44980 r5:8524bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee255fb0 to 0xee255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53400 INFO: task kworker/0:755:7728 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d70f2000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:756:7730 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:7730 tgid:7730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee239d84 r8:00000002 r7:60000013 r6:ee239d8c r5:8524d400 r4:8524d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee239e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524d400 r7:00000000 r6:83018000 r5:00001000 r4:7f7d3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee265000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c97b8c r4:85c97800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c97b8c r4:85c44a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524d400 r8:85c44a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44a00 r8:8027f5e8 r7:ee255e60 r6:85c44a80 r5:8524d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee239fb0 to 0xee239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53540 INFO: task kworker/0:756:7730 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d77db000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:7731 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:7731 tgid:7731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee275d84 r8:00000002 r7:60000113 r6:ee275d8c r5:8524e000 r4:8524e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee275e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524e000 r7:00000000 r6:83018000 r5:00001000 r4:7f7d5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee26d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c97f8c r4:85c97c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c97f8c r4:85c44b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524e000 r8:85c44b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44b00 r8:8027f5e8 r7:ee255e60 r6:85c44b80 r5:8524e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee275fb0 to 0xee275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53880 INFO: task kworker/0:757:7731 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d77db000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:758:7733 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:758 state:D stack:0 pid:7733 tgid:7733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee27dd84 r8:00000002 r7:60000013 r6:ee27dd8c r5:8524c800 r4:8524c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee27de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524c800 r7:00000000 r6:83018000 r5:00001000 r4:7f7d7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee279000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca038c r4:85ca0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca038c r4:85c44c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524c800 r8:85c44c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44c00 r8:8027f5e8 r7:ee255e60 r6:85c44c80 r5:8524c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee27dfb0 to 0xee27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53540 INFO: task kworker/0:758:7733 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d77db000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:7735 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:7735 tgid:7735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee28dd84 r8:00000002 r7:60000013 r6:ee28dd8c r5:85c2ec00 r4:85c2ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c2ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee28de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee285000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca078c r4:85ca0400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca078c r4:85c44d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c2ec00 r8:85c44d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44d00 r8:8027f5e8 r7:ee255e60 r6:85c44d80 r5:85c2ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee28dfb0 to 0xee28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53a40 INFO: task kworker/0:759:7735 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d77db000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:760:7738 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:760 state:D stack:0 pid:7738 tgid:7738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2a5d84 r8:00000002 r7:60000013 r6:ee2a5d8c r5:85d18000 r4:85d18000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d18000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85880280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d18000 r7:00000000 r6:83018000 r5:00001000 r4:7f7e1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2b9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca0b8c r4:85ca0800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca0b8c r4:85c44e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d18000 r8:85c44e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44e00 r8:8027f5e8 r7:ee255e60 r6:85c44e80 r5:85d18000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2a5fb0 to 0xee2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53d00 INFO: task kworker/0:760:7738 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d7e07000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:7742 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:7742 tgid:7742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2c5d84 r8:00000002 r7:60000113 r6:ee2c5d8c r5:85d19800 r4:85d19800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d19800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2c5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54a80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d19800 r7:00000000 r6:83018000 r5:00001000 r4:7f7ed000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee305000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca178c r4:85ca1400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca178c r4:85c44f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d19800 r8:85c44f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44f00 r8:8027f5e8 r7:ee255e60 r6:85c44f80 r5:85d19800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2c5fb0 to 0xee2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53e80 INFO: task kworker/0:761:7742 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8036000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:7744 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:7744 tgid:7744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2d5d84 r8:00000002 r7:60000013 r6:ee2d5d8c r5:85d18c00 r4:85d18c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d18c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c541c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7e5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2d1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca0f8c r4:85ca0c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca0f8c r4:85c51000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d18c00 r8:85c5102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51000 r8:8027f5e8 r7:ee2c5e60 r6:85c51080 r5:85d18c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2d5fb0 to 0xee2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54200 INFO: task kworker/0:762:7744 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8036000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:7746 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:7746 tgid:7746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2e5d84 r8:00000002 r7:60000013 r6:ee2e5d8c r5:85d1a400 r4:85d1a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2e5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c544c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f7e7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2dd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca1b8c r4:85ca1800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca1b8c r4:85c51100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1a400 r8:85c5112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51100 r8:8027f5e8 r7:ee2c5e60 r6:85c51180 r5:85d1a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2e5fb0 to 0xee2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54480 INFO: task kworker/0:763:7746 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8646000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:7748 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:7748 tgid:7748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2f1d84 r8:00000002 r7:60000113 r6:ee2f1d8c r5:85d1b000 r4:85d1b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2f1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f7e9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2e9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca1f8c r4:85ca1c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca1f8c r4:85c51200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1b000 r8:85c5122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51200 r8:8027f5e8 r7:ee2c5e60 r6:85c51280 r5:85d1b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2f1fb0 to 0xee2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54480 INFO: task kworker/0:764:7748 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8646000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:765:7750 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:765 state:D stack:0 pid:7750 tgid:7750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee301d84 r8:00000002 r7:60000013 r6:ee301d8c r5:85d1d400 r4:85d1d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee301e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f7ef000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee30d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca278c r4:85ca2400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca278c r4:85c51400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1d400 r8:85c5142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51400 r8:8027f5e8 r7:ee2c5e60 r6:85c51480 r5:85d1d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee301fb0 to 0xee301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54800 INFO: task kworker/0:765:7750 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8b3b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:766:7753 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:7753 tgid:7753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee299d84 r8:00000002 r7:60000113 r6:ee299d8c r5:85c21800 r4:85c21800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c21800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee299e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c21800 r7:00000000 r6:83018000 r5:00001000 r4:7f7f1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee319000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca238c r4:85ca2000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca238c r4:85c51500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c21800 r8:85c5152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51500 r8:8027f5e8 r7:ee301e60 r6:85bc4500 r5:85c21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee299fb0 to 0xee299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54100 INFO: task kworker/0:766:7753 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8b3b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:7756 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:767 state:D stack:0 pid:7756 tgid:7756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee329d84 r8:00000002 r7:60000013 r6:ee329d8c r5:85c23c00 r4:85c23c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee329e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7f7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee349000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca378c r4:85ca3400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca378c r4:85c51580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c23c00 r8:85c515ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51580 r8:8027f5e8 r7:ee299e60 r6:85bc4580 r5:85c23c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee329fb0 to 0xee329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54d00 INFO: task kworker/0:767:7756 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8b3b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:768:7757 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:768 state:D stack:0 pid:7757 tgid:7757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee331d84 r8:00000002 r7:60000013 r6:ee331d8c r5:85c23000 r4:85c23000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee331e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c23000 r7:00000000 r6:83018000 r5:00001000 r4:7f7f3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee325000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca2f8c r4:85ca2c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca2f8c r4:85c51600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c23000 r8:85c5162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51600 r8:8027f5e8 r7:ee329e60 r6:85bc4600 r5:85c23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee331fb0 to 0xee331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54e80 INFO: task kworker/0:768:7757 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d909f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:7759 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:7759 tgid:7759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee33dd84 r8:00000002 r7:60000013 r6:ee33dd8c r5:85c20c00 r4:85c20c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c20c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee33de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7f5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee339000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca2b8c r4:85ca2800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca2b8c r4:85c51380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c20c00 r8:85c513ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51380 r8:8027f5e8 r7:ee329e60 r6:85bc4680 r5:85c20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee33dfb0 to 0xee33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54e00 INFO: task kworker/0:769:7759 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d98c6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:770:7761 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:770 state:D stack:0 pid:7761 tgid:7761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee351d84 r8:00000002 r7:60000113 r6:ee351d8c r5:85c24800 r4:85c24800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c24800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee351e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a0c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c24800 r7:00000000 r6:83018000 r5:00001000 r4:7f7f9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee359000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca3b8c r4:85ca3800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca3b8c r4:85c51300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c24800 r8:85c5132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51300 r8:8027f5e8 r7:ee329e60 r6:85bc4700 r5:85c24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee351fb0 to 0xee351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54400 INFO: task kworker/0:770:7761 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d98c6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:771:7763 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:7763 tgid:7763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee361d84 r8:00000002 r7:60000113 r6:ee361d8c r5:85c25400 r4:85c25400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c25400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee361e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a300 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c25400 r7:00000000 r6:83018000 r5:00001000 r4:7f7fb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee369000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca3f8c r4:85ca3c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca3f8c r4:85c51680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c25400 r8:85c516ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51680 r8:8027f5e8 r7:ee351e60 r6:85bc4780 r5:85c25400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee361fb0 to 0xee361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a280 INFO: task kworker/0:771:7763 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d9d77000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:772:7765 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:772 state:D stack:0 pid:7765 tgid:7765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee371d84 r8:00000002 r7:60000113 r6:ee371d8c r5:85c26000 r4:85c26000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c26000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee371e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9aa00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c26000 r7:00000000 r6:83018000 r5:00001000 r4:7f807000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca978c r4:85ca9400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca978c r4:85c51700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c26000 r8:85c5172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51700 r8:8027f5e8 r7:ee361e60 r6:85bc4800 r5:85c26000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee371fb0 to 0xee371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a400 INFO: task kworker/0:772:7765 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: da3d5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:7767 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:7767 tgid:7767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee37dd84 r8:00000002 r7:60000013 r6:ee37dd8c r5:85c26c00 r4:85c26c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c26c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee37de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a3c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7fd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee379000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9778c r4:85c97400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9778c r4:85c51780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c26c00 r8:85c517ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51780 r8:8027f5e8 r7:ee371e60 r6:85bc4880 r5:85c26c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee37dfb0 to 0xee37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a280 INFO: task kworker/0:773:7767 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: da3d5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:7770 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:7770 tgid:7770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee39dd84 r8:00000002 r7:60000013 r6:ee39dd8c r5:85c58000 r4:85c58000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c58000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee39de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c58000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ff000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee389000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca838c r4:85ca8000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca838c r4:85c51800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c58000 r8:85c5182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51800 r8:8027f5e8 r7:ee371e60 r6:85bc4900 r5:85c58000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee39dfb0 to 0xee39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a800 INFO: task kworker/0:774:7770 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: da3d5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:775:7772 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:775 state:D stack:0 pid:7772 tgid:7772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3add84 r8:00000002 r7:60000013 r6:ee3add8c r5:85c59800 r4:85c59800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c59800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3ade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c59800 r7:00000000 r6:83018000 r5:00001000 r4:7f801000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee395000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca8b8c r4:85ca8800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca8b8c r4:85c51880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c59800 r8:85c518ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51880 r8:8027f5e8 r7:ee371e60 r6:85bc4980 r5:85c59800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3adfb0 to 0xee3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a940 INFO: task kworker/0:775:7772 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: da8a3000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:7773 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:7773 tgid:7773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2fdd84 r8:00000002 r7:60000113 r6:ee2fdd8c r5:85d1c800 r4:85d1c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2fde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f803000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3a5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca8f8c r4:85ca8c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca8f8c r4:85c51900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1c800 r8:85c5192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51900 r8:8027f5e8 r7:ee371e60 r6:85c51980 r5:85d1c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2fdfb0 to 0xee2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a640 INFO: task kworker/0:776:7773 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dab3f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:777:7775 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:777 state:D stack:0 pid:7775 tgid:7775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3a1d84 r8:00000002 r7:60000113 r6:ee3a1d8c r5:85d1e000 r4:85d1e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3a1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f805000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3b5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca878c r4:85ca8400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca878c r4:85c51a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1e000 r8:85c51a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51a00 r8:8027f5e8 r7:ee371e60 r6:85c51a80 r5:85d1e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3a1fb0 to 0xee3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a940 INFO: task kworker/0:777:7775 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dab3f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:7777 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:7777 tgid:7777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3b1d84 r8:00000002 r7:60000113 r6:ee3b1d8c r5:85d1ec00 r4:85d1ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3b1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9adc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f80b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3d9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca9b8c r4:85ca9800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca9b8c r4:85c51b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1ec00 r8:85c51b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51b00 r8:8027f5e8 r7:ee371e60 r6:85c51b80 r5:85d1ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3b1fb0 to 0xee3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9aa00 INFO: task kworker/0:778:7777 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dac4a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:779:7780 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:779 state:D stack:0 pid:7780 tgid:7780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3bdd84 r8:00000002 r7:60000113 r6:ee3bdd8c r5:85d1bc00 r4:85d1bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3bde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9acc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f809000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3cd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca938c r4:85ca9000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca938c r4:85c51c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1bc00 r8:85c51c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51c00 r8:8027f5e8 r7:ee3b1e60 r6:85c51c80 r5:85d1bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3bdfb0 to 0xee3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9ac40 INFO: task kworker/0:779:7780 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dac4a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:7782 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:7782 tgid:7782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3c9d84 r8:00000002 r7:60000013 r6:ee3c9d8c r5:85248c00 r4:85248c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85248c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3c9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9ae40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85248c00 r7:00000000 r6:83018000 r5:00001000 r4:7f80f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3f1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85caa38c r4:85caa000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85caa38c r4:85c51d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85248c00 r8:85c51d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51d00 r8:8027f5e8 r7:ee3b1e60 r6:85c51d80 r5:85248c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3c9fb0 to 0xee3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9ae40 INFO: task kworker/0:780:7782 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: daef4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:7784 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:781 state:D stack:0 pid:7784 tgid:7784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3d5d84 r8:00000002 r7:60000013 r6:ee3d5d8c r5:8524ec00 r4:8524ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c55400 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f80d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3e5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca9f8c r4:85ca9c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca9f8c r4:85c51e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524ec00 r8:85c51e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51e00 r8:8027f5e8 r7:ee3c9e60 r6:85c51e80 r5:8524ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3d5fb0 to 0xee3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c55d80 INFO: task kworker/0:781:7784 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: db25c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:782:7786 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:782 state:D stack:0 pid:7786 tgid:7786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3e1d84 r8:00000002 r7:60000113 r6:ee3e1d8c r5:85d20000 r4:85d20000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d20000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3e1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a1c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d20000 r7:00000000 r6:83018000 r5:00001000 r4:7f815000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee415000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85caaf8c r4:85caac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85caaf8c r4:85c51f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d20000 r8:85c51f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51f00 r8:8027f5e8 r7:ee3c9e60 r6:85c51f80 r5:85d20000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3e1fb0 to 0xee3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9afc0 INFO: task kworker/0:782:7786 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: db4d2000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:7788 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:7788 tgid:7788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3edd84 r8:00000002 r7:60000113 r6:ee3edd8c r5:85d20c00 r4:85d20c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d20c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3ede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f811000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3fd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85caab8c r4:85caa800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85caab8c r4:85c78000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d20c00 r8:85c7802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78000 r8:8027f5e8 r7:ee3e1e60 r6:85c78080 r5:85d20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3edfb0 to 0xee3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9af80 INFO: task kworker/0:783:7788 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dba73000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:7790 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:7790 tgid:7790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3f9d84 r8:00000002 r7:60000113 r6:ee3f9d8c r5:85d21800 r4:85d21800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d21800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3f9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d21800 r7:00000000 r6:83018000 r5:00001000 r4:7f813000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee409000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85caa78c r4:85caa400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85caa78c r4:85c78100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d21800 r8:85c7812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78100 r8:8027f5e8 r7:ee3e1e60 r6:85c78180 r5:85d21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3f9fb0 to 0xee3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a100 INFO: task kworker/0:784:7790 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dba73000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:7796 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:7796 tgid:7796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee405d84 r8:00000002 r7:60000113 r6:ee405d8c r5:85d22400 r4:85d22400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d22400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee405e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d22400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebee3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cab78c r4:85cab400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cab78c r4:85c78200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d22400 r8:85c7822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78200 r8:8027f5e8 r7:ee3e1e60 r6:85c78280 r5:85d22400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee405fb0 to 0xee405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a600 INFO: task kworker/0:785:7796 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dbf74000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:7797 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:7797 tgid:7797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee261d84 r8:00000002 r7:60000113 r6:ee261d8c r5:85d23000 r4:85d23000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d23000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee261e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d23000 r7:00000000 r6:83018000 r5:00001000 r4:7f783000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed241000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cabf8c r4:85cabc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cabf8c r4:85c78300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d23000 r8:85c7832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78300 r8:8027f5e8 r7:ee405e60 r6:85c78380 r5:85d23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee261fb0 to 0xee261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a300 INFO: task kworker/0:786:7797 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dc292000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:788:7799 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:7799 tgid:7799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1ddd84 r8:00000002 r7:60000113 r6:ee1ddd8c r5:85d24800 r4:85d24800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d24800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1dde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d24800 r7:00000000 r6:83018000 r5:00001000 r4:7f785000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb09000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cac38c r4:85cac000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cac38c r4:85c78500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d24800 r8:85c7852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78500 r8:8027f5e8 r7:ee171e60 r6:85c78580 r5:85d24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1ddfb0 to 0xee1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a100 INFO: task kworker/0:788:7799 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dc292000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:7801 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:7801 tgid:7801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1e9d84 r8:00000002 r7:60000113 r6:ee1e9d8c r5:85d25400 r4:85d25400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d25400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1e9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c64680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d25400 r7:00000000 r6:83018000 r5:00001000 r4:7f80b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3f3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cacb8c r4:85cac800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cacb8c r4:85c78600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d25400 r8:85c7862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78600 r8:8027f5e8 r7:ee171e60 r6:85c78680 r5:85d25400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1e9fb0 to 0xee1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a440 INFO: task kworker/0:789:7801 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dc292000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:7870 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:7870 tgid:7870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee4a5d84 r8:00000002 r7:60000113 r6:ee4a5d8c r5:85d28c00 r4:85d28c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d28c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee4a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c64880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f84d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee53b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d75f8c r4:85d75c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d75f8c r4:85c78700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d28c00 r8:85c7872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78700 r8:8027f5e8 r7:ee171e60 r6:85c78780 r5:85d28c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee4a5fb0 to 0xee4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c64600 INFO: task kworker/0:790:7870 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dc6f6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:82259270 [<80201ac8>] (show_stack) from [<80220544>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac8>] (show_stack) from [<80220544>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<802204d4>] (dump_stack_lvl) from [<80220568>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<80220550>] (dump_stack) from [<81a4156c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4140c>] (nmi_cpu_backtrace) from [<81a416b8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c610 r5:8281af40 r4:ffffffff [<81a41588>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:000199a8 r8:82ab5564 r7:8280c78c r6:0000777a r5:8281b508 r4:860ca00c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80380490>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80380490>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80380490>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437) [<8037ffe8>] (watchdog) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8037ffe8 r7:83349700 r6:83349700 r5:83251800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8334b580 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2817 Comm: pr/ttyAMA0 Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a60904>] lr : [<80a64800>] psr: 600f0113 sp : ebf59eb0 ip : ebf59ec0 fp : ebf59ebc r10: 8295a684 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295a5e8 r5 : 00000000 r4 : 00000001 r3 : 0000ef95 r2 : 00000000 r1 : 600f0113 r0 : 842b9c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84627bc0 DAC: fffffffd Call trace: [<81a608dc>] (_raw_spin_unlock_irqrestore) from [<80a64800>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a608dc>] (_raw_spin_unlock_irqrestore) from [<80a64800>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]) [<81a608dc>] (_raw_spin_unlock_irqrestore) from [<80a64800>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a647e0>] (pl011_console_device_unlock) from [<802e7d54>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7cd4>] (nbcon_emit_one) from [<802e7f74>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c610 r5:8449d400 r4:8295a5e8 [<802e7dcc>] (nbcon_kthread_func) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a5e8 r8:802e7dcc r7:84558500 r6:84558500 r5:8449d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf59fb0 to 0xebf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:838aa980