Extracting prog: 11m26.815702518s Minimizing prog: 3h0m35.669746577s Simplifying prog options: 0s Extracting C: 9m1.592075461s Simplifying C: 58m40.039457668s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$ITER_CREATE-write$cgroup_int-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r3}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$ITER_CREATE-write$cgroup_int-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r3}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 7 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$ITER_CREATE-write$cgroup_int-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$ITER_CREATE-write$cgroup_int detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$ITER_CREATE detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 4h19m44.117036644s repro crashed as (corrupted=false): INFO: task kworker/1:1:47 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:47 tgid:47 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df921d84 r8:00000002 r7:60000113 r6:df921d8c r5:833a5400 r4:833a5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df921e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85871c80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbef000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fdf8c r4:857fdc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fdf8c r4:832a0000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a5400 r8:832a002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0000 r8:8027f5e8 r7:df879e60 r6:83369e00 r5:833a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf921fb0 to 0xdf921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:832a1000 INFO: task kworker/1:1:47 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:3:2885 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:2885 tgid:2885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ec83dd84 r8:00000002 r7:60000113 r6:ec83dd8c r5:8386e000 r4:8386e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8386e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec83de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221fc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8386e000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e238c r4:847e2000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e238c r4:84584180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8386e000 r8:845841ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84584180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84584180 r8:8027f5e8 r7:df83de60 r6:84584100 r5:8386e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec83dfb0 to 0xec83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845818c0 INFO: task kworker/0:3:2885 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/1:0:3091 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3091 tgid:3091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df981d84 r8:00000002 r7:60000113 r6:df981d8c r5:84486000 r4:84486000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84486000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858726c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84486000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe95000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580938c r4:85809000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580938c r4:8475ec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84486000 r8:8475ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475ec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475ec80 r8:8027f5e8 r7:e05ede60 r6:8475e780 r5:84486000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84787840 INFO: task kworker/1:0:3091 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/1:3:3110 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3110 tgid:3110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df9a5d84 r8:00000002 r7:60000113 r6:df9a5d8c r5:84150000 r4:84150000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84150000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85870080 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84150000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec86b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580b78c r4:8580b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580b78c r4:84229c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84150000 r8:84229c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84229c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84229c00 r8:8027f5e8 r7:e05ede60 r6:8456cc00 r5:84150000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a5fb0 to 0xdf9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847183c0 INFO: task kworker/1:3:3110 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/1:9:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df9bdd84 r8:00000002 r7:60000113 r6:df9bdd8c r5:83ad8000 r4:83ad8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9bde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e4000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555938c r4:85559000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555938c r4:8456e780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8000 r8:8456e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8456e780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8456e780 r8:8027f5e8 r7:df9f1e60 r6:8456cd80 r5:83ad8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9bdfb0 to 0xdf9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741400 INFO: task kworker/1:9:3126 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/1:10:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df9add84 r8:00000002 r7:60000113 r6:df9add8c r5:83a81800 r4:83a81800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a81800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5e340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf53000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85422f8c r4:85422c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85422f8c r4:8456e380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a81800 r8:8456e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8456e380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8456e380 r8:8027f5e8 r7:df9bde60 r6:8475e700 r5:83a81800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9adfb0 to 0xdf9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741100 INFO: task kworker/1:10:3127 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:9:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:83ac0000 r4:83ac0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a8d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac0000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e02b3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e1f8c r4:847e1c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e1f8c r4:8478b100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac0000 r8:8478b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b100 r8:8027f5e8 r7:ec83de60 r6:8478b180 r5:83ac0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791080 INFO: task kworker/0:9:3139 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:10:3141 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:83ac1800 r4:83ac1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a8f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0257000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e1b8c r4:847e1800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e1b8c r4:8478b200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac1800 r8:8478b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b200 r8:8027f5e8 r7:ec83de60 r6:8478b280 r5:83ac1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847912c0 INFO: task kworker/0:10:3141 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:11:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:83ac6c00 r4:83ac6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae25000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536db8c r4:8536d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536db8c r4:8478b300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6c00 r8:8478b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b300 r8:8027f5e8 r7:ec83de60 r6:8478b380 r5:83ac6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847912c0 INFO: task kworker/0:11:3143 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 INFO: task kworker/0:12:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa45d84 r8:00000002 r7:60000013 r6:dfa45d8c r5:83ac4800 r4:83ac4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479e100 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa55000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e278c r4:847e2400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e278c r4:8478b400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac4800 r8:8478b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b400 r8:8027f5e8 r7:dfa75e60 r6:8478b480 r5:83ac4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847912c0 INFO: task kworker/0:12:3144 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83880c00 r4:83880c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83880c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a58e80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83880c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa85000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528a78c r4:8528a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528a78c r4:8478b500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83880c00 r8:8478b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b500 r8:8027f5e8 r7:dfa75e60 r6:8478b580 r5:83880c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791a40 INFO: task kworker/0:13:3148 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3149 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83886000 r4:83886000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83886000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a39c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83886000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac79000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529f78c r4:8529f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529f78c r4:8478b600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83886000 r8:8478b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b600 r8:8027f5e8 r7:dfa75e60 r6:8478b680 r5:83886000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791a40 INFO: task kworker/0:14:3149 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83881800 r4:83881800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83881800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84743b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83881800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb374000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536cf8c r4:8536cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536cf8c r4:8478b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83881800 r8:8478b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b700 r8:8027f5e8 r7:dfa75e60 r6:8478b780 r5:83881800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847918c0 INFO: task kworker/0:15:3151 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3152 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:83883c00 r4:83883c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83883c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8a380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83883c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa61000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540d78c r4:8540d400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8540d78c r4:8478b800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83883c00 r8:8478b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b800 r8:8027f5e8 r7:dfa75e60 r6:8478b880 r5:83883c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791a40 INFO: task kworker/0:16:3152 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3154 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:844d0000 r4:844d0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791cc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8536fb8c r4:8536f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536fb8c r4:8478b900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d0000 r8:8478b92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b900 r8:8027f5e8 r7:dfaa5e60 r6:8478b980 r5:844d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791bc0 INFO: task kworker/0:17:3154 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3157 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:844d5400 r4:844d5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a858c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd11000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556638c r4:85566000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556638c r4:8478ba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d5400 r8:8478ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478ba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ba00 r8:8027f5e8 r7:dfaa5e60 r6:8478ba80 r5:844d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791dc0 INFO: task kworker/0:18:3157 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfac9d84 r8:00000002 r7:60000013 r6:dfac9d8c r5:844d6000 r4:844d6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e478c r4:847e4400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e478c r4:8478bb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6000 r8:8478bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478bb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bb00 r8:8027f5e8 r7:dfabde60 r6:8478bb80 r5:844d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791f00 INFO: task kworker/0:19:3158 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:844d4800 r4:844d4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ce800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534ab8c r4:8534a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534ab8c r4:8478bc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d4800 r8:8478bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478bc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bc00 r8:8027f5e8 r7:dfabde60 r6:8478bc80 r5:844d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746100 INFO: task kworker/0:20:3160 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3162 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:844d3c00 r4:844d3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bb040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542278c r4:85422400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542278c r4:830b8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d3c00 r8:830b842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027f5e8 r7:df9bde60 r6:8478bd00 r5:844d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741980 INFO: task kworker/1:11:3162 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3165 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfad5d84 r8:00000002 r7:60000013 r6:dfad5d8c r5:84486c00 r4:84486c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84486c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847465c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84486c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85480f8c r4:85480c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85480f8c r4:8478bd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84486c00 r8:8478bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478bd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bd80 r8:8027f5e8 r7:dfabde60 r6:830b8380 r5:84486c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847464c0 INFO: task kworker/0:21:3165 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3167 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83242400 r4:83242400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bb180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85483f8c r4:85483c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85483f8c r4:830b8680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:830b86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8680 r8:8027f5e8 r7:df9bde60 r6:830b8500 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741480 INFO: task kworker/1:12:3167 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3169 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:83ace000 r4:83ace000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ace000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ace000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843bbf8c r4:843bbc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843bbf8c r4:8456cb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ace000 r8:8456cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8456cb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8456cb80 r8:8027f5e8 r7:df9bde60 r6:84199a00 r5:83ace000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741b00 INFO: task kworker/1:13:3169 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3170 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:844d0c00 r4:844d0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508cbc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb855000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554738c r4:85547000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554738c r4:8478be00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d0c00 r8:8478be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478be00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478be00 r8:8027f5e8 r7:dfabde60 r6:8478be80 r5:844d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847467c0 INFO: task kworker/0:22:3170 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3173 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:844d1800 r4:844d1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587ab80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3fd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e678c r4:847e6400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e678c r4:8478bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d1800 r8:8478bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bf00 r8:8027f5e8 r7:dfabde60 r6:8478bf80 r5:844d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746a80 INFO: task kworker/0:23:3173 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3175 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb19d84 r8:00000002 r7:60000013 r6:dfb19d8c r5:833a0c00 r4:833a0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858728c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebec7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85809b8c r4:85809800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85809b8c r4:838a1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a0c00 r8:838a11ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838a1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a1180 r8:8027f5e8 r7:df9bde60 r6:838a1100 r5:833a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84741200 INFO: task kworker/1:14:3175 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3177 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:83aeb000 r4:83aeb000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aeb000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219440 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aeb000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556738c r4:85567000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556738c r4:8474e000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aeb000 r8:8474e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e000 r8:8027f5e8 r7:dfb39e60 r6:83358300 r5:83aeb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746d80 INFO: task kworker/0:24:3177 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3179 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:8385e000 r4:8385e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8385e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e8ec0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8385e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85567b8c r4:85567800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85567b8c r4:8474e080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8385e000 r8:8474e0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e080 r8:8027f5e8 r7:dfb39e60 r6:83358200 r5:8385e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746a00 INFO: task kworker/0:25:3179 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb41d84 r8:00000002 r7:60000013 r6:dfb41d8c r5:844d6c00 r4:844d6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84746e40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e638c r4:847e6000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e638c r4:8474e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6c00 r8:8474e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e180 r8:8027f5e8 r7:dfb39e60 r6:8474e200 r5:844d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746c40 INFO: task kworker/0:26:3181 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dbc2b000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:844d2400 r4:844d2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85871e40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc0f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fe78c r4:857fe400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fe78c r4:84729000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d2400 r8:8472902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84729000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84729000 r8:8027f5e8 r7:dfb19e60 r6:8474e280 r5:844d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474d240 INFO: task kworker/1:15:3183 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de3df000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:84468c00 r4:84468c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84468c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473d8c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84468c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf13000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cd38c r4:855cd000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cd38c r4:8474e100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84468c00 r8:8474e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e100 r8:8027f5e8 r7:dfb39e60 r6:8474e300 r5:84468c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84746a00 INFO: task kworker/0:27:3184 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de732000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:84468000 r4:84468000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84468000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cdb80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84468000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca61000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ce38c r4:855ce000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ce38c r4:8474e380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84468000 r8:8474e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e380 r8:8027f5e8 r7:dfb39e60 r6:8474e400 r5:84468000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734240 INFO: task kworker/0:28:3187 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de855000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3189 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:8446ec00 r4:8446ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cd6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb003000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cf78c r4:855cf400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cf78c r4:8474e480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446ec00 r8:8474e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e480 r8:8027f5e8 r7:dfb39e60 r6:8474e500 r5:8446ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734380 INFO: task kworker/0:29:3189 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: de855000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df985d84 r8:00000002 r7:60000113 r6:df985d8c r5:84469800 r4:84469800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84469800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df985e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9a80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84469800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba0b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e6f8c r4:847e6c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e6f8c r4:8474e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84469800 r8:8474e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e580 r8:8027f5e8 r7:dfb39e60 r6:8474e600 r5:84469800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf985fb0 to 0xdf985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734500 INFO: task kworker/0:30:3191 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: deb8a000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:8446d400 r4:8446d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856aa040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446d400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e778c r4:847e7400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847e778c r4:8474e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446d400 r8:8474e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e700 r8:8027f5e8 r7:dfb39e60 r6:8474e780 r5:8446d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734680 INFO: task kworker/0:31:3193 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df021000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:8446a400 r4:8446a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856aa6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb7d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579438c r4:85794000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579438c r4:8474e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446a400 r8:8474e82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e800 r8:8027f5e8 r7:df9e9e60 r6:8474e880 r5:8446a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734680 INFO: task kworker/0:32:3195 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df0d4000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:8446b000 r4:8446b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895c00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446b000 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85794b8c r4:85794800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85794b8c r4:8474e900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446b000 r8:8474e92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474e900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474e900 r8:8027f5e8 r7:dfb91e60 r6:8474e980 r5:8446b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734680 INFO: task kworker/0:33:3196 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df0d4000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:8446bc00 r4:8446bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f129000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd9d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ddf8c r4:858ddc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858ddf8c r4:8474ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446bc00 r8:8474ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ea00 r8:8027f5e8 r7:dfb81e60 r6:8474ea80 r5:8446bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734b00 INFO: task kworker/0:34:3199 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df852000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb9dd84 r8:00000002 r7:60000013 r6:dfb9dd8c r5:8446c800 r4:8446c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8446c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847db3c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446c800 r7:00000000 r6:83018000 r5:00001000 r4:7f241000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed057000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ee38c r4:847ee000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ee38c r4:8474eb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446c800 r8:8474eb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474eb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474eb00 r8:8027f5e8 r7:dfb81e60 r6:8474eb80 r5:8446c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734cc0 INFO: task kworker/0:35:3201 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df852000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:83aa3000 r4:83aa3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ae9c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa3000 r7:00000000 r6:83018000 r5:00001000 r4:7f177000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece73000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f238c r4:858f2000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858f238c r4:8474ec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa3000 r8:8474ec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ec00 r8:8027f5e8 r7:dfb9de60 r6:8474ec80 r5:83aa3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734cc0 INFO: task kworker/0:36:3203 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: df852000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3205 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:83aa5400 r4:83aa5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575cf40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa5400 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579538c r4:85795000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579538c r4:8474ed00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa5400 r8:8474ed2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ed00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ed00 r8:8027f5e8 r7:dfb9de60 r6:8474ed80 r5:83aa5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84734f00 INFO: task kworker/0:37:3205 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dfcd3000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:849e0000 r4:849e0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85946040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f247000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ee78c r4:847ee400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ee78c r4:8474ee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0000 r8:8474ee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ee00 r8:8027f5e8 r7:dfb9de60 r6:8474ee80 r5:849e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db100 INFO: task kworker/0:38:3207 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: dfcd3000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:849e0c00 r4:849e0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f245000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed087000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847eeb8c r4:847ee800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847eeb8c r4:8474ef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:8474ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ef00 r8:8027f5e8 r7:dfb9de60 r6:8474ef80 r5:849e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db2c0 INFO: task kworker/0:39:3209 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e0103000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3211 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:849e1800 r4:849e1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85891780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f229000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf17000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85794f8c r4:85794c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85794f8c r4:84a50000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e1800 r8:84a5002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50000 r8:8027f5e8 r7:dfb9de60 r6:84a50080 r5:849e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db400 INFO: task kworker/0:40:3211 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: e0103000 e012d000 00000001 80239b98 7f32d000 00000001 9d40: 82ac05a0 7f32d000 e012d000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3213 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:849e2400 r4:849e2400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e2400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847db780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f243000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed06f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847edf8c r4:847edc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847edf8c r4:84a50100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e2400 r8:84a5012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50100 r8:8027f5e8 r7:dfb9de60 r6:84a50180 r5:849e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db4c0 INFO: task kworker/0:41:3213 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 7f90c000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:849e3c00 r4:849e3c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e3c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587d800 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4d7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596238c r4:85962000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596238c r4:84a50200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e3c00 r8:84a5022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50200 r8:8027f5e8 r7:dfb9de60 r6:84a50280 r5:849e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db680 INFO: task kworker/0:42:3215 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 7fe66000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3216 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:849e4800 r4:849e4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dba40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f23f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed03f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85797f8c r4:85797c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85797f8c r4:84a50300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e4800 r8:84a5032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50300 r8:8027f5e8 r7:dfb99e60 r6:84a50380 r5:849e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db680 INFO: task kworker/0:43:3216 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 7fe66000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3219 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:849e5400 r4:849e5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587d180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596138c r4:85961000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596138c r4:84a50400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e5400 r8:84a5042c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50400 r8:8027f5e8 r7:dfb99e60 r6:84a50480 r5:849e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847db940 INFO: task kworker/0:44:3219 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8039a000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3221 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc2dd84 r8:00000002 r7:60000013 r6:dfc2dd8c r5:849e3000 r4:849e3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb3c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc5b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fef8c r4:857fec00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fef8c r4:84729080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e3000 r8:847290ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84729080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84729080 r8:8027f5e8 r7:dfb19e60 r6:84a50500 r5:849e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474d500 INFO: task kworker/1:16:3221 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 8039a000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3223 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:83aac800 r4:83aac800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aac800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aac800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc99000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ff78c r4:857ff400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ff78c r4:84729100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aac800 r8:8472912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84729100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84729100 r8:8027f5e8 r7:dfb19e60 r6:84729180 r5:83aac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8474da40 INFO: task kworker/1:17:3223 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 808dd000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3225 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:83aab000 r4:83aab000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aab000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599b1c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aab000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed06d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a52b8c r4:85a52800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a52b8c r4:84a50580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aab000 r8:84a505ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50580 r8:8027f5e8 r7:dfc15e60 r6:84729200 r5:83aab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847dbdc0 INFO: task kworker/0:45:3225 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 808dd000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3227 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:83aa8000 r4:83aa8000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa8000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862f80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa8000 r7:00000000 r6:83018000 r5:00001000 r4:7f32d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed61f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596338c r4:85963000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596338c r4:84a50600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8000 r8:84a5062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50600 r8:8027f5e8 r7:dfc09e60 r6:84729280 r5:83aa8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51080 INFO: task kworker/0:46:3227 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 80c54000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3229 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc59d84 r8:00000002 r7:60000013 r6:dfc59d8c r5:83aa8c00 r4:83aa8c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa8c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862b00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f241000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed061000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847eff8c r4:847efc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847eff8c r4:84a50680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8c00 r8:84a506ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50680 r8:8027f5e8 r7:dfc09e60 r6:84729300 r5:83aa8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a511c0 INFO: task kworker/0:47:3229 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 80c54000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3232 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc31d84 r8:00000002 r7:60000113 r6:dfc31d8c r5:83aeec00 r4:83aeec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aeec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858721c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aeec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fff8c r4:857ffc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857fff8c r4:84729380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aeec00 r8:847293ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84729380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84729380 r8:8027f5e8 r7:dfb19e60 r6:84729400 r5:83aeec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84797f40 INFO: task kworker/1:18:3232 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 80d8f000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3233 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:8385d400 r4:8385d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8385d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599b040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8385d400 r7:00000000 r6:83018000 r5:00001000 r4:7f3ad000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed89d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5278c r4:85a52400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5278c r4:84a50700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8385d400 r8:84a5072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50700 r8:8027f5e8 r7:dfc09e60 r6:84729480 r5:8385d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:48:3233 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 81347000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3235 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc79d84 r8:00000002 r7:60000013 r6:dfc79d8c r5:8449b000 r4:8449b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ebcf5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8580838c r4:84729500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d20: 81838000 ecf31000 00000001 80239b98 7f37f000 00000001 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8449ec00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edafb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85a5378c r4:84a50780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8449ec00 r8:84a507ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50780 r8:8027f5e8 r7:dfc09e60 r6:84729600 r5:8449ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51400 INFO: task kworker/0:49:3238 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 81838000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3240 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:84498c00 r4:84498c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84498c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2300 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84498c00 r7:00000000 r6:83018000 r5:00001000 r4:7f437000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6db000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485478c r4:84854400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485478c r4:84a50800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84498c00 r8:84a5082c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edadb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8485538c r4:84855000 r10:61c88647 r9:8449c800 r8:84a508ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a51700 Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 81959000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3243 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:8449bc00 r4:8449bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8449bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed623000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8485438c r4:84a50900 Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) r4:84a518c0 Call trace: r4:00000000 r5:80000113 r4:80239bb0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 task:kworker/0:53 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c5940 r5:00001000 r4:edc81000 r5:85b1938c r4:85b19000 r10:00000000 r9:84a50980 r8:8027f5e8 r7:dfca5e60 r6:84729800 r5:84498000 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918888 r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:8449e000 r4:8449e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8449e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b38d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8449e000 r7:00000000 r6:83018000 r5:00001000 r4:7f547000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb39000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5438c r4:85a54000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5438c r4:84a50a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8449e000 r8:84a50a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50a00 r8:8027f5e8 r7:dfca5e60 r6:84729880 r5:8449e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51d00 INFO: task kworker/0:54:3247 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 821a8000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3249 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed981000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:849a078c r4:84a50a80 Exception stack(0xdfce5fb0 to 0xdfce5ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3251 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918888 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:849c8000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfd41000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8485578c r4:84a50b00 Exception stack(0xdfcf5fb0 to 0xdfcf5ff8) task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc7b000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:849ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f53f000 r5:00001000 r4:edc67000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485638c r4:84856000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485638c r4:84a50c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ca400 r8:84a50c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50c00 r8:8027f5e8 r7:dfce5e60 r6:84729a80 r5:849ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847dbd40 INFO: task kworker/0:58:3255 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 82b06000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3258 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd2dd84 r8:00000002 r7:60000013 r6:dfd2dd8c r5:849cb000 r4:849cb000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cb000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd2de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b38780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f53d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc03000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485678c r4:84856400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485678c r4:84a50c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cb000 r8:84a50cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50c80 r8:8027f5e8 r7:dfce5e60 r6:84729b00 r5:849cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd2dfb0 to 0xdfd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85a3578c r4:85a35400 r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed99d000 r5:8485738c r4:84857000 r10:61c88647 r9:849cbc00 r8:84a50d2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d20: 82f06000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3261 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfc65d84 r8:00000002 r7:60000013 r6:dfc65d8c r5:849e6c00 r4:849e6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b383c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f539000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed597000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84856f8c r4:84856c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84856f8c r4:84a50d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e6c00 r8:84a50dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a50d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a50d80 r8:8027f5e8 r7:dfce5e60 r6:84a50e00 r5:849e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5f240 INFO: task kworker/0:61:3261 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:62:3263 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:62 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd3dd84 r8:00000002 r7:60000013 r6:dfd3dd8c r5:849e6000 r4:849e6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed9b1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84856b8c r4:84856800 r7:dddced80 r6:83018000 r5:84856b8c r4:84a50e80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3267 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:3267 tgid:3267 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed999000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a038c r4:849a0000 r7:dddced80 r6:83018000 r5:849a038c r4:84a50f80 r10:00000000 r9:84a50f80 r8:8027f5e8 r7:dfce5e60 r6:84729d00 r5:849ce000 Workqueue: events bpf_prog_free_deferred 9d20: 834ee000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed969000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:849a0f8c r4:848a5000 Exception stack(0xdfd69fb0 to 0xdfd69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5f680 INFO: task kworker/0:64:3270 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 834ee000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3271 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918888 r9:dfd6dd84 r8:00000002 r7:60000113 r6:dfd6dd8c r5:849cc800 r4:00000000 r9:83018005 r8:849cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f607000 r5:00001000 r4:ecd87000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8485d78c r4:848a5080 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeae89d28 to 0xeae89d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:3273 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd71d84 r8:00000002 r7:60000013 r6:dfd71d8c r5:84499800 r4:84499800 r5:84499800 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed93d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:849a0b8c r4:848a5100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84499800 r8:848a512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5100 r8:8027f5e8 r7:dfd6de60 r6:84729e80 r5:84499800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd71fb0 to 0xdfd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5fbc0 INFO: task kworker/0:66:3273 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 83b13000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed897000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a178c r4:849a1400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849a178c r4:848a5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84280000 r8:848a51ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5180 r8:8027f5e8 r7:dfd6de60 r6:84729f00 r5:84280000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5f980 INFO: task kworker/0:67:3275 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:eae89dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 Workqueue: events bpf_prog_free_deferred r5:84280c00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ecdab000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84280c00 r8:848a522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a5fb00 Call trace: 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:69 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd7dd84 r8:00000002 r7:60000113 r6:dfd7dd8c r5:84281800 r4:84281800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84281800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd7de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cd180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84281800 r7:00000000 r6:83018000 r5:00001000 r4:7f5f7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485cf8c r4:8485cc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485cf8c r4:848a5280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84281800 r8:848a52ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5280 r8:8027f5e8 r7:dfd6de60 r6:848a6000 r5:84281800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd7dfb0 to 0xdfd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a5fd40 INFO: task kworker/0:69:3279 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 84670000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r5:85a3578c r4:85a35400 r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:70 state:D stack:0 pid:3282 tgid:3282 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:84282400 r7:00000000 r6:83018000 r5:00001000 r4:7f6d1000 r5:00001000 r4:ed583000 r5:849a138c r4:849a1000 r10:61c88647 r9:84282400 r8:848a532c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 84670000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3283 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd85d84 r8:00000002 r7:60000113 r6:dfd85d8c r5:84283000 r4:84283000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84283000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd85e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3df000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a1b8c r4:849a1800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85a3578c r4:85a35400 r4:848b5600 r4:00000001 r4:847da040 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84283c00 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eccf7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdfd89fb0 to 0xdfd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a2200 INFO: task kworker/0:72:3286 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 84b9e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:3287 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd8dd84 r8:00000002 r7:60000113 r6:dfd8dd8c r5:84284800 r4:84284800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84284800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd8de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc8a40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84284800 r7:00000000 r6:83018000 r5:00001000 r4:7f607000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc2d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485df8c r4:8485dc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485df8c r4:848a5480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84284800 r8:848a54ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5480 r8:8027f5e8 r7:dfd89e60 r6:848a6200 r5:84284800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd8dfb0 to 0xdfd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a22c0 INFO: task kworker/0:73:3287 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 84e39000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3289 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfd91d84 r8:00000002 r7:60000113 r6:dfd91d8c r5:84285400 r4:84285400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84285400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd91e08 r4:00000000 r5:00001000 r4:ed33b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a1f8c r4:849a1c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:848a5500 r8:8027f5e8 r7:dfd89e60 r6:848a6280 r5:84285400 Workqueue: events bpf_prog_free_deferred 9d20: 84e39000 ecf31000 00000001 80239b98 7f37f000 00000001 r4:eae89dc0 r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd9de08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed247000 r5:8485c38c r4:8485c000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8531e000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3294 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3294 tgid:3294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfda5d84 r8:00000002 r7:60000013 r6:dfda5d8c r5:849b1800 r4:849b1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a2e00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f6b5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb43000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485fb8c r4:8485f800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485fb8c r4:848a5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b1800 r8:848a562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5600 r8:8027f5e8 r7:dfd89e60 r6:848a6380 r5:849b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda5fb0 to 0xdfda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:848a2780 [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85a3578c r4:85a35400 r4:848b5600 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:77 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed157000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485cb8c r4:848a5680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b2400 r8:848a56ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5680 r8:8027f5e8 r7:dfd89e60 r6:848a6400 r5:849b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda9fb0 to 0xdfda9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a2680 INFO: task kworker/0:77:3295 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 85769000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3297 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:849b0c00 r4:82918884 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed097000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485d38c r4:8485d000 r7:dddced80 r6:83018000 r5:8485d38c r4:848a5700 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:847da040 task:kworker/0:79 state:D stack:0 pid:3299 tgid:3299 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b4600 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f6c5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecffb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485db8c r4:8485d800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485db8c r4:848a5780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b4800 r8:848a57ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5780 r8:8027f5e8 r7:dfd89e60 r6:848a6500 r5:849b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb9fb0 to 0xdfdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a2700 INFO: task kworker/0:79:3299 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 85abb000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf1b000 r5:8485e78c r4:8485e400 r10:61c88647 r9:849b3c00 r8:848a582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a2b00 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r4:00000000 r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:3303 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:3303 tgid:3303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfdc9d84 r8:00000002 r7:60000113 r6:dfdc9d8c r5:849b6000 r4:849b6000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b6000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc9e08 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eceaf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfdc9fb0 to 0xdfdc9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848a2c40 INFO: task kworker/0:81:3303 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 86037000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:847da040 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ece1b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485eb8c r4:8485e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 86037000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd5e08 r5:00001000 r4:ecdeb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485c78c r4:8485c400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:848a5980 r8:8027f5e8 r7:dfd89e60 r6:848a6700 r5:849b6c00 r4:848a2e80 r4:00000000 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84286c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6bb000 r5:00001000 r4:ecdd3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485f78c r4:8485f400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485f78c r4:848a5a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84286c00 r8:848a5a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5a00 r8:8027f5e8 r7:dfd89e60 r6:848a6780 r5:84286c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4280 INFO: task kworker/0:84:3309 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 86b71000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:849f0000 r4:82918884 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecd8b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8485f38c r4:848a5a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f0000 r8:848a5aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5a80 r8:8027f5e8 r7:dfd89e60 r6:848a6800 r5:849f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfde5fb0 to 0xdfde5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4280 INFO: task kworker/0:85:3311 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 86fe1000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecf8f000 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:86:3313 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:3313 tgid:3313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfdedd84 r8:00000002 r7:60000113 r6:dfdedd8c r5:849f1800 r4:849f1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a2b80 r4:00000000 r5:00001000 r4:dfac3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485ef8c r4:8485ec00 r7:dddced80 r6:83018000 r5:8485ef8c r4:848a5b80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:82918888 r9:dfdf5d84 r8:00000002 r7:60000113 r6:dfdf5d8c r5:849f0c00 r4:849f0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5f700 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f789000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb7b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7238c r4:85a72000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7238c r4:848a5b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f0c00 r8:848a5b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a5b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5b00 r8:8027f5e8 r7:dfdede60 r6:848a6900 r5:849f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdf5fb0 to 0xdfdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b4500 INFO: task kworker/0:87:3315 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 875f3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3578c r4:85a35400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3578c r4:848b5600 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847da040 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed4d5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r5:00001000 r4:ecf8f000 r5:85a3578c r4:85a35400 r10:61c88647 r9:85169800 r8:848b562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5600 r8:8027f5e8 r7:eadcde60 r6:84721c00 r5:85169800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847da040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3320 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3320 tgid:3320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:dfdf9d84 r8:00000002 r7:60000013 r6:dfdf9d8c r5:849f3000 r4:849f3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f3000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872bc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf09000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580ab8c r4:8580a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8580ab8c r4:848a6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f3000 r8:848a69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848a6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a6980 r8:8027f5e8 r7:dfd49e60 r6:848a6a00 r5:849f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdf9fb0 to 0xdfdf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ba600 INFO: task kworker/1:21:3320 is blocked on a mutex likely owned by task kworker/1:364:4416. task:kworker/1:364 state:R running task stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:85169800 r8:80200be4 r7:eae89d5c r6:ffffffff r5:85169800 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeae89d28 to 0xeae89d70) 9d20: 875f3000 ecf31000 00000001 80239b98 7f37f000 00000001 9d40: 82ac05a0 7f37f000 ecf31000 8280c930 82ac11c4 eae89da4 eae89da8 eae89d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae89dc0 r5:eae89e08 r4:eae89dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85169800 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [ <> /0x280 kernel/kthread.c:464) r10:00000000 r9:85a8d480 r8:8027f5e8 r7:ede31e60 r6:85a8d500 r5:859f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb69fb0 to 0xedb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:679:7462 is blocked on a mutex likely owned by task kworker/1:370:4428. 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:eaeb9dc0 r5:00001000 r4:ed35d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:edb83000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a6078c r4:85a60400 r10:61c88647 r9:859fc800 r8:85a8d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848a2c80 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:7465 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:681 state:D stack:0 pid:7465 tgid:7465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edb75d84 r8:00000002 r7:60000013 r6:edb75d8c r5:859fd400 r4:859fd400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859fd400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f6eb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edab5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a60b8c r4:85a60800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a60b8c r4:85a8d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fd400 r8:85a8d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8d680 r8:8027f5e8 r7:edb71e60 r6:85a8d700 r5:859fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb75fb0 to 0xedb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873080 INFO: task kworker/0:681:7465 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918888 r9:edb79d84 r8:00000002 r7:60000013 r6:edb79d8c r5:859fa400 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edac9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85a60f8c r4:85a8d780 Exception stack(0xedb79fb0 to 0xedb79ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:7469 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:7469 tgid:7469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edb81d84 r8:00000002 r7:60000013 r6:edb81d8c r5:859fec00 r4:859fec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859fec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb81e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f6ef000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb19000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6138c r4:85a61000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6138c r4:85a8d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fec00 r8:85a8d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8d880 r8:8027f5e8 r7:edb71e60 r6:85a8d900 r5:859fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb81fb0 to 0xedb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873200 INFO: task kworker/0:683:7469 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edc97000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaeb9d28 to 0xeaeb9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:7473 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:7473 tgid:7473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edbc5d84 r8:00000002 r7:60000113 r6:edbc5d8c r5:859fe000 r4:859fe000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859fe000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbc5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873a40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f6f3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb8b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a61b8c r4:85a61800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a61b8c r4:85a8da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fe000 r8:85a8daac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8da80 r8:8027f5e8 r7:edb95e60 r6:85a8db00 r5:859fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbc5fb0 to 0xedbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873800 INFO: task kworker/0:685:7473 is blocked on a mutex likely owned by task kworker/1:370:4428. r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebd0f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a6178c r4:85a8db80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae0c00 r8:85a8dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8db80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8db80 r8:8027f5e8 r7:edb95e60 r6:85a8dc00 r5:83ae0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbddfb0 to 0xedbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873240 INFO: task kworker/0:686:7475 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: caff4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:7478 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8585e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbf9e08 r5:00001000 r4:edbb7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a61f8c r4:85a61c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a61f8c r4:85a8dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585e000 r8:85a8dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8dc80 r8:8027f5e8 r7:edb95e60 r6:85886d00 r5:8585e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbf9fb0 to 0xedbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873c40 INFO: task kworker/0:687:7478 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: caff4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:edbfb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a6278c r4:85a8dd00 Exception stack(0xedc09fb0 to 0xedc09ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85873c40 INFO: task kworker/0:688:7479 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cbacd000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc15000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a6238c r4:85a8dd80 r10:00000000 r9:85a8dd80 r8:8027f5e8 r7:edb95e60 r6:85886e00 r5:8585d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85368cc0 INFO: task kworker/0:689:7481 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cbd06000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) Not tainted 6.15.0-syzkaller #0 r4:85858c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc45e08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc37000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a62b8c r4:85a8de00 Exception stack(0xedc45fb0 to 0xedc45ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:7486 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:7486 tgid:7486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edc55d84 r8:00000002 r7:60000113 r6:edc55d8c r5:85bb0c00 r4:85bb0c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb0c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc55e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85764000 r9:83018005 r8:85bb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6fd000 r5:00001000 r4:edc47000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a62f8c r4:85a8de80 Exception stack(0xedc55fb0 to 0xedc55ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:7487 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:7487 tgid:7487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edc5dd84 r8:00000002 r7:60000113 r6:edc5dd8c r5:85bb1800 r4:85bb1800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb1800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc5de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85764100 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f6ff000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc57000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6378c r4:85a63400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6378c r4:85a8df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb1800 r8:85a8df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8df00 r8:8027f5e8 r7:edb95e60 r6:85886f80 r5:85bb1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc5dfb0 to 0xedc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764140 INFO: task kworker/0:692:7487 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cc11e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85bb2400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc73000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a63b8c r4:85a63800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a63b8c r4:85a8df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb2400 r8:85a8dfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a8df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a8df80 r8:8027f5e8 r7:edb95e60 r6:85bc4000 r5:85bb2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc6dfb0 to 0xedc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857642c0 INFO: task kworker/0:693:7489 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ccaac000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:7492 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:7492 tgid:7492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edcf9d84 r8:00000002 r7:60000013 r6:edcf9d8c r5:85bb4800 r4:85bb4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:edcb9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a63f8c r4:85a63c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85bb4800 r8:8568802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcf9fb0 to 0xedcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764400 INFO: task kworker/0:694:7492 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ccaac000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcfde08 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edca5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84855b8c r4:85688080 Exception stack(0xedcfdfb0 to 0xedcfdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857644c0 INFO: task kworker/0:695:7493 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ccd0b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bf9700 Workqueue: events bpf_prog_free_deferred r5:83ae2400 r4:82918884 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edd39000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a68f8c r4:85a68c00 r7:dddced80 r6:83018000 r5:85a68f8c r4:85688100 r10:00000000 r9:85688100 r8:8027f5e8 r7:edcf9e60 r6:85688180 r5:83ae2400 INFO: task kworker/0:696:7495 is blocked on a mutex likely owned by task kworker/1:370:4428. Exception stack(0xeaeb9d28 to 0xeaeb9d70) r4:82ac11e4 r4:eaeb9dc0 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edcd7000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6878c r4:85688200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb3c00 r8:8568822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688200 r8:8027f5e8 r7:edc51e60 r6:85bc4180 r5:85bb3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd05fb0 to 0xedd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764280 INFO: task kworker/0:697:7497 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cd360000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:7499 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:7499 tgid:7499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edd29d84 r8:00000002 r7:60000113 r6:edd29d8c r5:85bb6c00 r4:85bb6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd29e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85764ac0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bb6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f70b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edced000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a68b8c r4:85a68800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a68b8c r4:85688280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85688280 r8:8027f5e8 r7:edc51e60 r6:85bc4200 r5:85bb6c00 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a6838c r4:85a68000 r4:85688300 Exception stack(0xedd4dfb0 to 0xedd4dff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cd8b3000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:700:7503 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:700 state:D stack:0 pid:7503 tgid:7503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edd75d84 r8:00000002 r7:60000013 r6:edd75d8c r5:85bb5400 r4:85bb5400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb5400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb93c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bb5400 r7:00000000 r6:83018000 r5:00001000 r4:7f723000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede45000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6a38c r4:85a6a000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6a38c r4:85688380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb5400 r8:856883ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688380 r8:8027f5e8 r7:edc51e60 r6:85bc4300 r5:85bb5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd75fb0 to 0xedd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764cc0 INFO: task kworker/0:700:7503 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cdb4b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd57000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:83ae3c00 r8:8568842c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r5:85a35f8c r4:85a35c00 r4:848b5900 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) Not tainted 6.15.0-syzkaller #0 task:kworker/0:702 state:D stack:0 pid:7507 tgid:7507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:edda1d84 r8:00000002 r7:60000113 r6:edda1d8c r5:83ae4800 r4:83ae4800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ae4800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edda1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85764f40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ae4800 r7:00000000 r6:83018000 r5:00001000 r4:7f713000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd6f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6938c r4:85a69000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6938c r4:85688500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae4800 r8:8568852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688500 r8:8027f5e8 r7:edd75e60 r6:85688580 r5:83ae4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedda1fb0 to 0xedda1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85764d80 INFO: task kworker/0:702:7507 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ce27b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ede1d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85a69b8c r4:85688600 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf9700 Workqueue: events bpf_prog_free_deferred [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6a78c r4:85a6a400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6a78c r4:85688700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae5400 r8:8568872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688700 r8:8027f5e8 r7:edd75e60 r6:85688780 r5:83ae5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede21fb0 to 0xede21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb93c0 INFO: task kworker/0:704:7516 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ce57a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:705:7519 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:705 state:D stack:0 pid:7519 tgid:7519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ede75d84 r8:00000002 r7:60000013 r6:ede75d8c r5:83ae6c00 r4:83ae6c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ae6c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede75e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ede97000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6b38c r4:85a6b000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:83ae6c00 r8:8568882c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: ce949000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:7520 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:7520 tgid:7520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:eddadd84 r8:00000002 r7:60000013 r6:eddadd8c r5:83ae3000 r4:83ae3000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ae3000 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddade08 r4:00000000 r5:00001000 r4:ede51000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6af8c r4:85a6ac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6af8c r4:85688900 r10:61c88647 r9:83ae3000 r8:8568892c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000001 INFO: task kworker/0:707:7522 blocked for more than 473 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbe5e08 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb9980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ae1800 r7:00000000 r6:83018000 r5:00001000 r4:7f729000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede71000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6ab8c r4:85a6a800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6ab8c r4:85688a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae1800 r8:85688a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688a00 r8:8027f5e8 r7:ede75e60 r6:85688a80 r5:83ae1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbe5fb0 to 0xedbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb9880 INFO: task kworker/0:707:7522 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cf0d3000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:708:7526 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r4:83ae0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede81e08 r5:00001000 r4:edead000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6b78c r4:85a6b400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6b78c r4:85688b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae0000 r8:85688b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688b00 r8:8027f5e8 r7:ede75e60 r6:85688b80 r5:83ae0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede81fb0 to 0xede81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb9b40 INFO: task kworker/0:708:7526 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cf443000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:848b5900 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:859fbc00 r4:82918884 r4:00000000 r5:00001000 r4:edebd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85688c00 r4:85bb9b40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cf443000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) task:kworker/0:710 state:D stack:0 pid:7529 tgid:7529 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edf31000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a70f8c r4:85a70c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a70f8c r4:85688d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84960000 r8:85688d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688d00 r8:8027f5e8 r7:ee0b5e60 r6:85688d80 r5:84960000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede8dfb0 to 0xede8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb9cc0 INFO: task kworker/0:710:7529 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cf818000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 r4:82ac11e4 r5:00001000 r4:ed35d000 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 task:kworker/0:711 state:D stack:0 pid:7532 tgid:7532 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eded1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84960c00 r8:85688e2c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:edeed000 r10:00000000 r9:85688f00 r8:8027f5e8 r7:ede8de60 r6:85688f80 r5:84961800 Exception stack(0xee0c1fb0 to 0xee0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85883180 INFO: task kworker/0:712:7534 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: cfd3b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edf05000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84962400 r8:854e302c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bf9700 r4:84963000 [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfaa1000 r10:61c88647 r9:84963000 r8:854e312c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d0116000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:715:7540 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:715 state:D stack:0 pid:7540 tgid:7540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee0c9d84 r8:00000002 r7:60000113 r6:ee0c9d8c r5:84963c00 r4:84963c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84963c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf49000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7038c r4:85a70000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7038c r4:854e3200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963c00 r8:854e322c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3200 r10:00000000 r9:854e3200 r8:8027f5e8 r7:ee0bde60 r6:854e3280 r5:84963c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:84964800 r4:82918884 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85883840 r5:00001000 r4:dfb0f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a71f8c r4:85a71c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a71f8c r4:854e3300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84964800 r8:854e332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3300 r8:8027f5e8 r7:ee0bde60 r6:854e3380 r5:84964800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0d1fb0 to 0xee0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85883680 INFO: task kworker/0:716:7545 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d06ef000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84965400 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfb5b000 r10:61c88647 r9:84965400 r8:854e342c r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84966000 r7:00000000 r6:83018000 r5:00001000 r4:7f78b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edba1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a71b8c r4:85a71800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a71b8c r4:854e3500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84966000 r8:854e352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3500 r8:8027f5e8 r7:ee0cde60 r6:854e3580 r5:84966000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda1dfb0 to 0xeda1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85883740 INFO: task kworker/0:718:7547 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d12d7000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:7549 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:7549 tgid:7549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84966c00 r4:82918884 r9:83018005 r8:84966c00 r7:00000000 r6:83018000 r5:00001000 r4:7f78f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:719:7549 is blocked on a mutex likely owned by task kworker/1:370:4428. r4:eaeb9dc0 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85c10000 r4:82918884 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbfd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a438c r4:849a4000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849a438c r4:854e3700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c10000 r8:854e372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3700 r8:8027f5e8 r7:eda21e60 r6:854e3780 r5:85c10000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee15dfb0 to 0xee15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb8cc0 INFO: task kworker/0:720:7654 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d1737000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r10:82918888 r9:ee17dd84 r8:00000002 r7:60000113 r6:ee17dd8c r5:85c14800 r4:00000000 r4:00000000 r5:00001000 r4:edd45000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:849a3b8c r4:849a3800 r4:854e3800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c13c00 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85c13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f793000 r5:00001000 r4:edcbf000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854e3900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589a240 INFO: task kworker/0:722:7659 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d1db4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:7661 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:7661 tgid:7661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee185d84 r8:00000002 r7:60000013 r6:ee185d8c r5:85c15400 r4:85c15400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edcf3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:849a378c r4:854e3a00 Exception stack(0xee185fb0 to 0xee185ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:00000000 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda25e08 r4:00000000 r5:00001000 r4:edd7b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a2b8c r4:849a2800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849a2b8c r4:854e3b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c16c00 r8:854e3b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3b00 r8:8027f5e8 r7:ee17de60 r6:854e3b80 r5:85c16c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda25fb0 to 0xeda25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589a600 INFO: task kworker/0:724:7664 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d2382000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eddcd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:849a238c r4:854e3c00 Exception stack(0xee179fb0 to 0xee179ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d60: 80230ad4 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:726:7667 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r4:85c13000 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee189e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589ac80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c13000 r7:00000000 r6:83018000 r5:00001000 r4:7f79f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede4f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8438c r4:85c84000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8438c r4:854e3d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c13000 r8:854e3d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3d00 r8:8027f5e8 r7:ee179e60 r6:854e3d80 r5:85c13000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee189fb0 to 0xee189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589ab00 INFO: task kworker/0:726:7667 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d2b96000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:7670 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:7670 tgid:7670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee191d84 r8:00000002 r7:60000113 r6:ee191d8c r5:85c12400 r4:85c12400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c12400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee191e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589aa80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c12400 r7:00000000 r6:83018000 r5:00001000 r4:7f79d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede29000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:849a338c r4:849a3000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849a338c r4:854e3e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c12400 r8:854e3e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3e00 r8:8027f5e8 r7:ee189e60 r6:854e3e80 r5:85c12400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee191fb0 to 0xee191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589ab80 INFO: task kworker/0:727:7670 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d2b96000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r5:85c10c00 r4:82918884 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee195e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589ae00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7a1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede89000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8478c r4:85c84400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8478c r4:854e3f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c10c00 r8:854e3f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e3f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e3f00 r8:8027f5e8 r7:ee189e60 r6:854e3f80 r5:85c10c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee195fb0 to 0xee195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589ad00 INFO: task kworker/0:728:7672 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d2fb3000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:729:7674 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r4:85c11800 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85c11800 r7:00000000 r6:83018000 r5:00001000 r4:7f7a3000 r5:00001000 r4:edebf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85bbc000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r5:85a35f8c r4:85a35c00 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:730:7676 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:730 state:D stack:0 pid:7676 tgid:7676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee19dd84 r8:00000002 r7:60000113 r6:ee19dd8c r5:84a00000 r4:84a00000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a00000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee19de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc3380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a00000 r7:00000000 r6:83018000 r5:00001000 r4:7f7a9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf6f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8578c r4:85c85400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8578c r4:85bbc100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a00000 r8:85bbc12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc100 r8:8027f5e8 r7:ee199e60 r6:85bbc180 r5:84a00000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee19dfb0 to 0xee19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589ae80 INFO: task kworker/0:730:7676 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d357d000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:731:7677 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:731 state:D stack:0 pid:7677 tgid:7677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:84a00c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee18de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc3000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7a5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edefb000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8538c r4:85c85000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8538c r4:85bbc200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a00c00 r8:85bbc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc200 r8:8027f5e8 r7:ee19de60 r6:85bbc280 r5:84a00c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee18dfb0 to 0xee18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3100 INFO: task kworker/0:731:7677 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d3807000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1a1e08 r5:00001000 r4:edf55000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bf9700 r10:82918888 r9:ee1a9d84 r8:00000002 r7:60000113 r6:ee1a9d8c r5:84a02400 r5:00001000 r4:ee01b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8638c r4:85c86000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8638c r4:85bbc400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a02400 r8:85bbc42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc400 r8:8027f5e8 r7:ee19de60 r6:85bbc480 r5:84a02400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1a9fb0 to 0xee1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3400 INFO: task kworker/0:733:7682 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84a03000 r4:82918884 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:edf8f000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3700 INFO: task kworker/0:734:7684 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d3bcc000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:7686 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:735 state:D stack:0 pid:7686 tgid:7686 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1b1e08 r9:83018005 r8:84a03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7ad000 r5:00001000 r4:edfbf000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee1b1fb0 to 0xee1b1ff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:736:7688 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:736 state:D stack:0 pid:7688 tgid:7688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1b5d84 r8:00000002 r7:60000013 r6:ee1b5d8c r5:84a04800 r4:84a04800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a04800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1b5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc38c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a04800 r7:00000000 r6:83018000 r5:00001000 r4:7f7af000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfef000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8678c r4:85c86400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8678c r4:85bbc700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a04800 r8:85bbc72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc700 r8:8027f5e8 r7:ee1a9e60 r6:85bbc780 r5:84a04800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1b5fb0 to 0xee1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc37c0 INFO: task kworker/0:736:7688 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d40e7000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:737 state:D stack:0 pid:7690 tgid:7690 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1b9e08 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ee09b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8738c r4:85c87000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a05400 r8:85bbc82c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xee1b9fb0 to 0xee1b9ff8) r4:85bc3880 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 9d60: 80230ad4 80239bb0 80000113 ffffffff r4:82ac11e4 r4:eaeb9dc0 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85a35f8c r4:85a35c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:738 state:D stack:0 pid:7691 tgid:7691 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918888 r9:ee1a5d84 r8:00000002 r7:60000113 r6:ee1a5d8c r5:84a06000 r4:84a06000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a06000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc3d80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a06000 r7:00000000 r6:83018000 r5:00001000 r4:7f7b5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee07b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c86f8c r4:85c86c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c86f8c r4:85bbc900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a06000 r8:85bbc92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbc900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbc900 r8:8027f5e8 r7:ee1b9e60 r6:85bbc980 r5:84a06000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1a5fb0 to 0xee1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3880 INFO: task kworker/0:738:7691 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d4a80000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a06c00 r4:82918884 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ee143000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85c87b8c r4:85bbca00 Exception stack(0xee1bdfb0 to 0xee1bdff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:740:7696 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:740 state:D stack:0 pid:7696 tgid:7696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1c1d84 r8:00000002 r7:60000113 r6:ee1c1d8c r5:85c28000 r4:85c28000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c28000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1c1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589a1c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c28000 r7:00000000 r6:83018000 r5:00001000 r4:7f7b9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee12b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c8778c r4:85c87400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c8778c r4:85bbcb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c28000 r8:85bbcb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbcb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbcb00 r8:8027f5e8 r7:ee1bde60 r6:85bbcb80 r5:85c28000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1c1fb0 to 0xee1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc3f40 INFO: task kworker/0:740:7696 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d4a80000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) r4:84bf9700 task:kworker/0:741 state:D stack:0 pid:7699 tgid:7699 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599d340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c29800 r7:00000000 r6:83018000 r5:00001000 r4:7f7bf000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1d7000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c87f8c r4:85c87c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c87f8c r4:85bbcc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c29800 r8:85bbcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bbcc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbcc00 r8:8027f5e8 r7:ee1bde60 r6:85bbcc80 r5:85c29800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1c9fb0 to 0xee1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d100 INFO: task kworker/0:741:7699 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d4d46000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:742:7700 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:742 state:D stack:0 pid:7700 tgid:7700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1cdd84 r8:00000002 r7:60000113 r6:ee1cdd8c r5:85c2a400 r4:85c2a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee21f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c94f8c r4:85c94c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85bbcd00 Exception stack(0xee1cdfb0 to 0xee1cdff8) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1c5e08 r5:00001000 r4:ee1e3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c9438c r4:85c94000 r4:85bbce00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d440 INFO: task kworker/0:743:7704 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d5342000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:7705 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:7705 tgid:7705 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1e1e08 r5:00001000 r4:ee1ef000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 r4:848b5900 Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:61c88647 r9:85c2c800 r8:85c4402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44000 r8:8027f5e8 r7:ee1cde60 r6:85c44080 r5:85c2c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1edfb0 to 0xee1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599da40 INFO: task kworker/0:745:7708 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d5c98000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:746:7710 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:746 state:D stack:0 pid:7710 tgid:7710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee205d84 r8:00000002 r7:60000113 r6:ee205d8c r5:85c2d400 r4:85c2d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c2d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee205e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599d900 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f7c7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee207000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9538c r4:85c95000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9538c r4:85c44100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c2d400 r8:85c4412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44100 r8:8027f5e8 r7:ee1cde60 r6:85c44180 r5:85c2d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee205fb0 to 0xee205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d8c0 INFO: task kworker/0:746:7710 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d5c98000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:7712 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:747 state:D stack:0 pid:7712 tgid:7712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee211d84 r8:00000002 r7:60000113 r6:ee211d8c r5:85c2e000 r4:85c2e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c2e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee211e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599db40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f7c9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee213000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9578c r4:85c95400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9578c r4:85c44200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c2e000 r8:85c4422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44200 r8:8027f5e8 r7:ee1cde60 r6:85c44280 r5:85c2e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee211fb0 to 0xee211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d440 INFO: task kworker/0:747:7712 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d613e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:7714 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:7714 tgid:7714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1f9d84 r8:00000002 r7:60000113 r6:ee1f9d8c r5:85c28c00 r4:85c28c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c28c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1f9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84180 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f76f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5f000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c95b8c r4:85c95800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c95b8c r4:85c44300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c28c00 r8:85c4432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44300 r8:8027f5e8 r7:ee1cde60 r6:85c44380 r5:85c28c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1f9fb0 to 0xee1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599d440 INFO: task kworker/0:748:7714 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d613e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:7715 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:7715 tgid:7715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee231d84 r8:00000002 r7:60000113 r6:ee231d8c r5:85248000 r4:85248000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85248000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee231e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599de40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85248000 r7:00000000 r6:83018000 r5:00001000 r4:7f7cd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee227000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c95f8c r4:85c95c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c95f8c r4:85c44400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85248000 r8:85c4442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44400 r8:8027f5e8 r7:ee1f9e60 r6:85c44480 r5:85248000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee231fb0 to 0xee231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599df80 INFO: task kworker/0:749:7715 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d634e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:750:7717 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:750 state:D stack:0 pid:7717 tgid:7717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee235d84 r8:00000002 r7:60000113 r6:ee235d8c r5:85249800 r4:85249800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85249800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee235e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848bab80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85249800 r7:00000000 r6:83018000 r5:00001000 r4:7f773000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda15000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c96b8c r4:85c96800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c96b8c r4:85c44500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85249800 r8:85c4452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44500 r8:8027f5e8 r7:ee1f9e60 r6:85c44580 r5:85249800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee235fb0 to 0xee235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599dcc0 INFO: task kworker/0:750:7717 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d634e000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:751:7719 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:751 state:D stack:0 pid:7719 tgid:7719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee23dd84 r8:00000002 r7:60000013 r6:ee23dd8c r5:85bb0000 r4:85bb0000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bb0000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee23de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1fc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f771000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed95b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9678c r4:85c96400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9678c r4:85c44600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bb0000 r8:85c4462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44600 r8:8027f5e8 r7:ee235e60 r6:85bc4400 r5:85bb0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee23dfb0 to 0xee23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599db00 INFO: task kworker/0:751:7719 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d637c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:7721 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:7721 tgid:7721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee245d84 r8:00000002 r7:60000013 r6:ee245d8c r5:85c20000 r4:85c20000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c20000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee245e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c20000 r7:00000000 r6:83018000 r5:00001000 r4:7f7d1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee259000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c96f8c r4:85c96c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c96f8c r4:85c44680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c20000 r8:85c446ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44680 r8:8027f5e8 r7:ee235e60 r6:85bc4480 r5:85c20000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee245fb0 to 0xee245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ba900 INFO: task kworker/0:752:7721 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d6b41000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:753:7724 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:753 state:D stack:0 pid:7724 tgid:7724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee21dd84 r8:00000002 r7:60000113 r6:ee21dd8c r5:8524a400 r4:8524a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee21de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524a400 r7:00000000 r6:83018000 r5:00001000 r4:7f77f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee157000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9638c r4:85c96000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9638c r4:85c44700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524a400 r8:85c4472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44700 r8:8027f5e8 r7:ee245e60 r6:85c44780 r5:8524a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee21dfb0 to 0xee21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53080 INFO: task kworker/0:753:7724 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d6b41000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:7726 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee24dd84 r8:00000002 r7:60000013 r6:ee24dd8c r5:8524b000 r4:8524b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee24de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53140 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524b000 r7:00000000 r6:83018000 r5:00001000 r4:7f7cf000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee22d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9738c r4:85c97000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9738c r4:85c44800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524b000 r8:85c4482c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44800 r8:8027f5e8 r7:ee245e60 r6:85c44880 r5:8524b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee24dfb0 to 0xee24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53300 INFO: task kworker/0:754:7726 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d6b41000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:755:7728 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:7728 tgid:7728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee255d84 r8:00000002 r7:60000013 r6:ee255d8c r5:8524bc00 r4:8524bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee255e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f7e3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca138c r4:85ca1000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca138c r4:85c44900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524bc00 r8:85c4492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44900 r8:8027f5e8 r7:ee245e60 r6:85c44980 r5:8524bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee255fb0 to 0xee255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53400 INFO: task kworker/0:755:7728 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d70f2000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:756:7730 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:7730 tgid:7730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee239d84 r8:00000002 r7:60000013 r6:ee239d8c r5:8524d400 r4:8524d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee239e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53580 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524d400 r7:00000000 r6:83018000 r5:00001000 r4:7f7d3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee265000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c97b8c r4:85c97800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c97b8c r4:85c44a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524d400 r8:85c44a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44a00 r8:8027f5e8 r7:ee255e60 r6:85c44a80 r5:8524d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee239fb0 to 0xee239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53540 INFO: task kworker/0:756:7730 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d77db000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:7731 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:7731 tgid:7731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee275d84 r8:00000002 r7:60000113 r6:ee275d8c r5:8524e000 r4:8524e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee275e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524e000 r7:00000000 r6:83018000 r5:00001000 r4:7f7d5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee26d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c97f8c r4:85c97c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c97f8c r4:85c44b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524e000 r8:85c44b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44b00 r8:8027f5e8 r7:ee255e60 r6:85c44b80 r5:8524e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee275fb0 to 0xee275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53880 INFO: task kworker/0:757:7731 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d77db000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:758:7733 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:758 state:D stack:0 pid:7733 tgid:7733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee27dd84 r8:00000002 r7:60000013 r6:ee27dd8c r5:8524c800 r4:8524c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee27de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53340 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524c800 r7:00000000 r6:83018000 r5:00001000 r4:7f7d7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee279000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca038c r4:85ca0000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca038c r4:85c44c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524c800 r8:85c44c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44c00 r8:8027f5e8 r7:ee255e60 r6:85c44c80 r5:8524c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee27dfb0 to 0xee27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53540 INFO: task kworker/0:758:7733 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d77db000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:7735 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:7735 tgid:7735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee28dd84 r8:00000002 r7:60000013 r6:ee28dd8c r5:85c2ec00 r4:85c2ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c2ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee28de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee285000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca078c r4:85ca0400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca078c r4:85c44d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c2ec00 r8:85c44d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44d00 r8:8027f5e8 r7:ee255e60 r6:85c44d80 r5:85c2ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee28dfb0 to 0xee28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53a40 INFO: task kworker/0:759:7735 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d77db000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:760:7738 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:760 state:D stack:0 pid:7738 tgid:7738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2a5d84 r8:00000002 r7:60000013 r6:ee2a5d8c r5:85d18000 r4:85d18000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d18000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85880280 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d18000 r7:00000000 r6:83018000 r5:00001000 r4:7f7e1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2b9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca0b8c r4:85ca0800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca0b8c r4:85c44e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d18000 r8:85c44e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44e00 r8:8027f5e8 r7:ee255e60 r6:85c44e80 r5:85d18000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2a5fb0 to 0xee2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53d00 INFO: task kworker/0:760:7738 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d7e07000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:7742 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:7742 tgid:7742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2c5d84 r8:00000002 r7:60000113 r6:ee2c5d8c r5:85d19800 r4:85d19800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d19800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2c5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54a80 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d19800 r7:00000000 r6:83018000 r5:00001000 r4:7f7ed000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee305000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca178c r4:85ca1400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca178c r4:85c44f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d19800 r8:85c44f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c44f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c44f00 r8:8027f5e8 r7:ee255e60 r6:85c44f80 r5:85d19800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2c5fb0 to 0xee2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c53e80 INFO: task kworker/0:761:7742 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8036000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:7744 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:7744 tgid:7744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2d5d84 r8:00000002 r7:60000013 r6:ee2d5d8c r5:85d18c00 r4:85d18c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d18c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c541c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7e5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2d1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca0f8c r4:85ca0c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca0f8c r4:85c51000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d18c00 r8:85c5102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51000 r8:8027f5e8 r7:ee2c5e60 r6:85c51080 r5:85d18c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2d5fb0 to 0xee2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54200 INFO: task kworker/0:762:7744 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8036000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:7746 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:7746 tgid:7746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2e5d84 r8:00000002 r7:60000013 r6:ee2e5d8c r5:85d1a400 r4:85d1a400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1a400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2e5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c544c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f7e7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2dd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca1b8c r4:85ca1800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca1b8c r4:85c51100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1a400 r8:85c5112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51100 r8:8027f5e8 r7:ee2c5e60 r6:85c51180 r5:85d1a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2e5fb0 to 0xee2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54480 INFO: task kworker/0:763:7746 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8646000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:7748 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:7748 tgid:7748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2f1d84 r8:00000002 r7:60000113 r6:ee2f1d8c r5:85d1b000 r4:85d1b000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1b000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2f1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54740 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f7e9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2e9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca1f8c r4:85ca1c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca1f8c r4:85c51200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1b000 r8:85c5122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51200 r8:8027f5e8 r7:ee2c5e60 r6:85c51280 r5:85d1b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2f1fb0 to 0xee2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54480 INFO: task kworker/0:764:7748 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8646000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:765:7750 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:765 state:D stack:0 pid:7750 tgid:7750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee301d84 r8:00000002 r7:60000013 r6:ee301d8c r5:85d1d400 r4:85d1d400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1d400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee301e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54480 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f7ef000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee30d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca278c r4:85ca2400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca278c r4:85c51400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1d400 r8:85c5142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51400 r8:8027f5e8 r7:ee2c5e60 r6:85c51480 r5:85d1d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee301fb0 to 0xee301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54800 INFO: task kworker/0:765:7750 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8b3b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:766:7753 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:7753 tgid:7753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee299d84 r8:00000002 r7:60000113 r6:ee299d8c r5:85c21800 r4:85c21800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c21800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee299e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54b40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c21800 r7:00000000 r6:83018000 r5:00001000 r4:7f7f1000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee319000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca238c r4:85ca2000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca238c r4:85c51500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c21800 r8:85c5152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51500 r8:8027f5e8 r7:ee301e60 r6:85bc4500 r5:85c21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee299fb0 to 0xee299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54100 INFO: task kworker/0:766:7753 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8b3b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:7756 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:767 state:D stack:0 pid:7756 tgid:7756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee329d84 r8:00000002 r7:60000013 r6:ee329d8c r5:85c23c00 r4:85c23c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee329e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7f7000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee349000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca378c r4:85ca3400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca378c r4:85c51580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c23c00 r8:85c515ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51580 r8:8027f5e8 r7:ee299e60 r6:85bc4580 r5:85c23c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee329fb0 to 0xee329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54d00 INFO: task kworker/0:767:7756 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d8b3b000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:768:7757 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:768 state:D stack:0 pid:7757 tgid:7757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee331d84 r8:00000002 r7:60000013 r6:ee331d8c r5:85c23000 r4:85c23000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee331e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54d40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c23000 r7:00000000 r6:83018000 r5:00001000 r4:7f7f3000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee325000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca2f8c r4:85ca2c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca2f8c r4:85c51600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c23000 r8:85c5162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51600 r8:8027f5e8 r7:ee329e60 r6:85bc4600 r5:85c23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee331fb0 to 0xee331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54e80 INFO: task kworker/0:768:7757 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d909f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:7759 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:7759 tgid:7759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee33dd84 r8:00000002 r7:60000013 r6:ee33dd8c r5:85c20c00 r4:85c20c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c20c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee33de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c54f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7f5000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee339000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca2b8c r4:85ca2800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca2b8c r4:85c51380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c20c00 r8:85c513ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51380 r8:8027f5e8 r7:ee329e60 r6:85bc4680 r5:85c20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee33dfb0 to 0xee33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54e00 INFO: task kworker/0:769:7759 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d98c6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:770:7761 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:770 state:D stack:0 pid:7761 tgid:7761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee351d84 r8:00000002 r7:60000113 r6:ee351d8c r5:85c24800 r4:85c24800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c24800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee351e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a0c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c24800 r7:00000000 r6:83018000 r5:00001000 r4:7f7f9000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee359000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca3b8c r4:85ca3800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca3b8c r4:85c51300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c24800 r8:85c5132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51300 r8:8027f5e8 r7:ee329e60 r6:85bc4700 r5:85c24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee351fb0 to 0xee351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c54400 INFO: task kworker/0:770:7761 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d98c6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:771:7763 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:7763 tgid:7763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee361d84 r8:00000002 r7:60000113 r6:ee361d8c r5:85c25400 r4:85c25400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c25400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee361e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a300 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c25400 r7:00000000 r6:83018000 r5:00001000 r4:7f7fb000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee369000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca3f8c r4:85ca3c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca3f8c r4:85c51680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c25400 r8:85c516ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51680 r8:8027f5e8 r7:ee351e60 r6:85bc4780 r5:85c25400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee361fb0 to 0xee361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a280 INFO: task kworker/0:771:7763 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: d9d77000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:772:7765 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:772 state:D stack:0 pid:7765 tgid:7765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee371d84 r8:00000002 r7:60000113 r6:ee371d8c r5:85c26000 r4:85c26000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c26000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee371e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9aa00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c26000 r7:00000000 r6:83018000 r5:00001000 r4:7f807000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3c1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca978c r4:85ca9400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca978c r4:85c51700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c26000 r8:85c5172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51700 r8:8027f5e8 r7:ee361e60 r6:85bc4800 r5:85c26000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee371fb0 to 0xee371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a400 INFO: task kworker/0:772:7765 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: da3d5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:7767 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:7767 tgid:7767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee37dd84 r8:00000002 r7:60000013 r6:ee37dd8c r5:85c26c00 r4:85c26c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c26c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee37de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a3c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7fd000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee379000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9778c r4:85c97400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9778c r4:85c51780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c26c00 r8:85c517ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51780 r8:8027f5e8 r7:ee371e60 r6:85bc4880 r5:85c26c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee37dfb0 to 0xee37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a280 INFO: task kworker/0:773:7767 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: da3d5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:7770 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:7770 tgid:7770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee39dd84 r8:00000002 r7:60000013 r6:ee39dd8c r5:85c58000 r4:85c58000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c58000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee39de08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c58000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ff000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee389000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca838c r4:85ca8000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca838c r4:85c51800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c58000 r8:85c5182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51800 r8:8027f5e8 r7:ee371e60 r6:85bc4900 r5:85c58000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee39dfb0 to 0xee39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a800 INFO: task kworker/0:774:7770 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: da3d5000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:775:7772 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:775 state:D stack:0 pid:7772 tgid:7772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3add84 r8:00000002 r7:60000013 r6:ee3add8c r5:85c59800 r4:85c59800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c59800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3ade08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a6c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c59800 r7:00000000 r6:83018000 r5:00001000 r4:7f801000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee395000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca8b8c r4:85ca8800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca8b8c r4:85c51880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c59800 r8:85c518ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51880 r8:8027f5e8 r7:ee371e60 r6:85bc4980 r5:85c59800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3adfb0 to 0xee3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a940 INFO: task kworker/0:775:7772 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: da8a3000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:7773 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:7773 tgid:7773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee2fdd84 r8:00000002 r7:60000113 r6:ee2fdd8c r5:85d1c800 r4:85d1c800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1c800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2fde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a780 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f803000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3a5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca8f8c r4:85ca8c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca8f8c r4:85c51900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1c800 r8:85c5192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51900 r8:8027f5e8 r7:ee371e60 r6:85c51980 r5:85d1c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2fdfb0 to 0xee2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a640 INFO: task kworker/0:776:7773 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dab3f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:777:7775 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:777 state:D stack:0 pid:7775 tgid:7775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3a1d84 r8:00000002 r7:60000113 r6:ee3a1d8c r5:85d1e000 r4:85d1e000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1e000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3a1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9a980 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f805000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3b5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca878c r4:85ca8400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca878c r4:85c51a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1e000 r8:85c51a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51a00 r8:8027f5e8 r7:ee371e60 r6:85c51a80 r5:85d1e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3a1fb0 to 0xee3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9a940 INFO: task kworker/0:777:7775 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dab3f000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:7777 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:7777 tgid:7777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3b1d84 r8:00000002 r7:60000113 r6:ee3b1d8c r5:85d1ec00 r4:85d1ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3b1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9adc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f80b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3d9000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca9b8c r4:85ca9800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca9b8c r4:85c51b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1ec00 r8:85c51b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51b00 r8:8027f5e8 r7:ee371e60 r6:85c51b80 r5:85d1ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3b1fb0 to 0xee3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9aa00 INFO: task kworker/0:778:7777 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dac4a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:779:7780 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:779 state:D stack:0 pid:7780 tgid:7780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3bdd84 r8:00000002 r7:60000113 r6:ee3bdd8c r5:85d1bc00 r4:85d1bc00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d1bc00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3bde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9acc0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d1bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f809000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3cd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca938c r4:85ca9000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca938c r4:85c51c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d1bc00 r8:85c51c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51c00 r8:8027f5e8 r7:ee3b1e60 r6:85c51c80 r5:85d1bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3bdfb0 to 0xee3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9ac40 INFO: task kworker/0:779:7780 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dac4a000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:7782 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:7782 tgid:7782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3c9d84 r8:00000002 r7:60000013 r6:ee3c9d8c r5:85248c00 r4:85248c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85248c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3c9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9ae40 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85248c00 r7:00000000 r6:83018000 r5:00001000 r4:7f80f000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3f1000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85caa38c r4:85caa000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85caa38c r4:85c51d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85248c00 r8:85c51d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51d00 r8:8027f5e8 r7:ee3b1e60 r6:85c51d80 r5:85248c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3c9fb0 to 0xee3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9ae40 INFO: task kworker/0:780:7782 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: daef4000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:7784 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:781 state:D stack:0 pid:7784 tgid:7784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3d5d84 r8:00000002 r7:60000013 r6:ee3d5d8c r5:8524ec00 r4:8524ec00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524ec00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3d5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c55400 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f80d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3e5000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca9f8c r4:85ca9c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca9f8c r4:85c51e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524ec00 r8:85c51e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51e00 r8:8027f5e8 r7:ee3c9e60 r6:85c51e80 r5:8524ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3d5fb0 to 0xee3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c55d80 INFO: task kworker/0:781:7784 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: db25c000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:782:7786 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:782 state:D stack:0 pid:7786 tgid:7786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3e1d84 r8:00000002 r7:60000113 r6:ee3e1d8c r5:85d20000 r4:85d20000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d20000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3e1e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a1c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d20000 r7:00000000 r6:83018000 r5:00001000 r4:7f815000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee415000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85caaf8c r4:85caac00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85caaf8c r4:85c51f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d20000 r8:85c51f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c51f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c51f00 r8:8027f5e8 r7:ee3c9e60 r6:85c51f80 r5:85d20000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3e1fb0 to 0xee3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9afc0 INFO: task kworker/0:782:7786 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: db4d2000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:7788 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:7788 tgid:7788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3edd84 r8:00000002 r7:60000113 r6:ee3edd8c r5:85d20c00 r4:85d20c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d20c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3ede08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c53f00 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f811000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3fd000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85caab8c r4:85caa800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85caab8c r4:85c78000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d20c00 r8:85c7802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78000 r8:8027f5e8 r7:ee3e1e60 r6:85c78080 r5:85d20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3edfb0 to 0xee3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85b9af80 INFO: task kworker/0:783:7788 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dba73000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:7790 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:7790 tgid:7790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee3f9d84 r8:00000002 r7:60000113 r6:ee3f9d8c r5:85d21800 r4:85d21800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d21800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee3f9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a040 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d21800 r7:00000000 r6:83018000 r5:00001000 r4:7f813000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee409000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85caa78c r4:85caa400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85caa78c r4:85c78100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d21800 r8:85c7812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78100 r8:8027f5e8 r7:ee3e1e60 r6:85c78180 r5:85d21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee3f9fb0 to 0xee3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a100 INFO: task kworker/0:784:7790 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dba73000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:7796 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:7796 tgid:7796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee405d84 r8:00000002 r7:60000113 r6:ee405d8c r5:85d22400 r4:85d22400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d22400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee405e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a380 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d22400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebee3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cab78c r4:85cab400 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cab78c r4:85c78200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d22400 r8:85c7822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78200 r8:8027f5e8 r7:ee3e1e60 r6:85c78280 r5:85d22400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee405fb0 to 0xee405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a600 INFO: task kworker/0:785:7796 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dbf74000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:7797 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:7797 tgid:7797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee261d84 r8:00000002 r7:60000113 r6:ee261d8c r5:85d23000 r4:85d23000 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d23000 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee261e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a500 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d23000 r7:00000000 r6:83018000 r5:00001000 r4:7f783000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed241000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cabf8c r4:85cabc00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cabf8c r4:85c78300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d23000 r8:85c7832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78300 r8:8027f5e8 r7:ee405e60 r6:85c78380 r5:85d23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee261fb0 to 0xee261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a300 INFO: task kworker/0:786:7797 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dc292000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:788:7799 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:7799 tgid:7799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1ddd84 r8:00000002 r7:60000113 r6:ee1ddd8c r5:85d24800 r4:85d24800 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d24800 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1dde08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7a5c0 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d24800 r7:00000000 r6:83018000 r5:00001000 r4:7f785000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb09000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cac38c r4:85cac000 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cac38c r4:85c78500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d24800 r8:85c7852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78500 r8:8027f5e8 r7:ee171e60 r6:85c78580 r5:85d24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1ddfb0 to 0xee1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a100 INFO: task kworker/0:788:7799 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dc292000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:7801 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:7801 tgid:7801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee1e9d84 r8:00000002 r7:60000113 r6:ee1e9d8c r5:85d25400 r4:85d25400 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d25400 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1e9e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c64680 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d25400 r7:00000000 r6:83018000 r5:00001000 r4:7f80b000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3f3000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cacb8c r4:85cac800 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cacb8c r4:85c78600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d25400 r8:85c7862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78600 r8:8027f5e8 r7:ee171e60 r6:85c78680 r5:85d25400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1e9fb0 to 0xee1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c7a440 INFO: task kworker/0:789:7801 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dc292000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:7870 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:7870 tgid:7870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a584f4>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a5756c>] (__schedule) from [<81a584f4>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918888 r9:ee4a5d84 r8:00000002 r7:60000113 r6:ee4a5d8c r5:85d28c00 r4:85d28c00 [<81a584c8>] (schedule) from [<81a588dc>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d28c00 r4:82918884 [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a588c4>] (schedule_preempt_disabled) from [<81a5afc0>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5acc0>] (__mutex_lock.constprop.0) from [<81a5b48c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee4a5e08 r4:00000000 [<81a5b478>] (__mutex_lock_slowpath) from [<81a5b4cc>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a5b490>] (mutex_lock) from [<804e1808>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c64880 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f84d000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee53b000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d75f8c r4:85d75c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d75f8c r4:85c78700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d28c00 r8:85c7872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c78700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c78700 r8:8027f5e8 r7:ee171e60 r6:85c78780 r5:85d28c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee4a5fb0 to 0xee4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85c64600 INFO: task kworker/0:790:7870 is blocked on a mutex likely owned by task kworker/1:370:4428. task:kworker/1:370 state:R running task stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5756c>] (__schedule) from [<81a58928>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:8516d400 r8:80200be4 r7:eaeb9d5c r6:ffffffff r5:8516d400 r4:00000000 [<81a588e8>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb9d28 to 0xeaeb9d70) 9d20: dc6f6000 ed2f3000 00000001 80239b98 7f383000 00000001 9d40: 82ac05a0 7f383000 ed2f3000 8280c930 82ac11c4 eaeb9da4 eaeb9da8 eaeb9d78 9d60: 80230ad4 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e15dc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11e4 [<804e13cc>] (__purge_vmap_area_lazy) from [<804e1984>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb9dc0 r5:eaeb9e08 r4:eaeb9dc0 [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e17a0>] (_vm_unmap_aliases) from [<804e56e8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474d000 r4:00000000 [<804e5580>] (vfree) from [<80544f8c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516d400 r7:00000000 r6:83018200 r5:00001000 r4:7f383000 [<80544f5c>] (execmem_free) from [<803c596c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35d000 [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c595c>] (bpf_jit_free_exec) from [<803c5d4c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c5ce4>] (bpf_jit_free) from [<803c6ea8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a35f8c r4:85a35c00 [<803c6d5c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a35f8c r4:848b5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516d400 r8:848b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848b5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848b5900 r8:8027f5e8 r7:eaeb1e60 r6:84721f00 r5:8516d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf9700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000113 r5:60000193 r4:82259270 [<80201ac8>] (show_stack) from [<80220544>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac8>] (show_stack) from [<80220544>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<802204d4>] (dump_stack_lvl) from [<80220568>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<80220550>] (dump_stack) from [<81a4156c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4140c>] (nmi_cpu_backtrace) from [<81a416b8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c610 r5:8281af40 r4:ffffffff [<81a41588>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:000199a8 r8:82ab5564 r7:8280c78c r6:0000777a r5:8281b508 r4:860ca00c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80380490>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80380490>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80380490>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437) [<8037ffe8>] (watchdog) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8037ffe8 r7:83349700 r6:83349700 r5:83251800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8334b580 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2817 Comm: pr/ttyAMA0 Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a60904>] lr : [<80a64800>] psr: 600f0113 sp : ebf59eb0 ip : ebf59ec0 fp : ebf59ebc r10: 8295a684 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295a5e8 r5 : 00000000 r4 : 00000001 r3 : 0000ef95 r2 : 00000000 r1 : 600f0113 r0 : 842b9c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84627bc0 DAC: fffffffd Call trace: [<81a608dc>] (_raw_spin_unlock_irqrestore) from [<80a64800>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a608dc>] (_raw_spin_unlock_irqrestore) from [<80a64800>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]) [<81a608dc>] (_raw_spin_unlock_irqrestore) from [<80a64800>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a647e0>] (pl011_console_device_unlock) from [<802e7d54>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7cd4>] (nbcon_emit_one) from [<802e7f74>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c610 r5:8449d400 r4:8295a5e8 [<802e7dcc>] (nbcon_kthread_func) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a5e8 r8:802e7dcc r7:84558500 r6:84558500 r5:8449d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf59fb0 to 0xebf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:838aa980