Extracting prog: 7m32.130137467s Minimizing prog: 1h51m51.509166417s Simplifying prog options: 0s Extracting C: 8m44.574847573s Simplifying C: 58m22.344122127s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="020000000200000000000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="020000000200000000000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 4 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h6m30.558307425s repro crashed as (corrupted=false): INFO: task kworker/1:1:43 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df911d84 r8:00000002 r7:60000013 r6:df911d8c r5:832f4800 r4:832f4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d8480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ab8c r4:8527a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527ab8c r4:832d0e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832f4800 r8:832d0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832d0e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832d0e00 r8:8027f5e8 r7:df879e60 r6:83809080 r5:832f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:832d1e40 INFO: task kworker/1:1:43 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b9616000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/1:0:3093 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3093 tgid:3093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:8330e000 r4:8330e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8330e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd0c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0eb8c r4:85a0e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0eb8c r4:8461dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8330e000 r8:8461dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461dd00 r8:8027f5e8 r7:df91de60 r6:84777c00 r5:8330e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d42ec0 INFO: task kworker/1:0:3093 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b9616000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:0:3099 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3099 tgid:3099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df975d84 r8:00000002 r7:60000113 r6:df975d8c r5:84522400 r4:84522400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84522400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df975e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479b2c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84522400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8873000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84feab8c r4:84fea800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84feab8c r4:84777e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84522400 r8:84777eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777e80 r8:8027f5e8 r7:df845e60 r6:84777e00 r5:84522400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf975fb0 to 0xdf975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d6a5c0 INFO: task kworker/0:0:3099 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b98c2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/1:3:3111 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3111 tgid:3111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df96dd84 r8:00000002 r7:60000013 r6:df96dd8c r5:83a90000 r4:83a90000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a90000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fdbc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a90000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a18f8c r4:85a18c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a18f8c r4:8461d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a90000 r8:8461d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461d600 r8:8027f5e8 r7:df91de60 r6:8461d500 r5:83a90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf96dfb0 to 0xdf96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46740 INFO: task kworker/1:3:3111 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b9fd8000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/1:6:3117 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83a29800 r4:83a29800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a29800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fdf00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a29800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca71000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a19b8c r4:85a19800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a19b8c r4:8461d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a29800 r8:8461d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461d280 r8:8027f5e8 r7:df91de60 r6:8461d180 r5:83a29800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46a40 INFO: task kworker/1:6:3117 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b9fd8000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/1:7:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:83242400 r4:83242400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c8200 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9db000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84430f8c r4:84430c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84430f8c r4:8461d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:8461d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461d080 r8:8027f5e8 r7:df9d5e60 r6:8461d100 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46c40 INFO: task kworker/1:7:3122 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ba28d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:4:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:844fc800 r4:844fc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844fc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517dc00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fcb38c r4:84fcb000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fcb38c r4:84777b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844fc800 r8:84777b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777b00 r8:8027f5e8 r7:df975e60 r6:8461d200 r5:844fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99780 INFO: task kworker/0:4:3125 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ba28d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:5:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:844f9800 r4:844f9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85066340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fc8b8c r4:84fc8800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fc8b8c r4:84777900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f9800 r8:8477792c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777900 r8:8027f5e8 r7:dfa01e60 r6:8461d580 r5:844f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99800 INFO: task kworker/0:5:3127 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ba60f000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:6:3129 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa21d84 r8:00000002 r7:60000013 r6:dfa21d8c r5:844fb000 r4:844fb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844fb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa35000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454b78c r4:8454b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454b78c r4:84777980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844fb000 r8:847779ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777980 r8:8027f5e8 r7:dfa01e60 r6:8461d680 r5:844fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99800 INFO: task kworker/0:6:3129 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ba8d3000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:7:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:83252400 r4:83252400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83252400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83252400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454af8c r4:8454ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454af8c r4:84777580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83252400 r8:847775ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777580 r8:8027f5e8 r7:dfa21e60 r6:8461d700 r5:83252400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99800 INFO: task kworker/0:7:3130 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bab6a000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3132 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa39d84 r8:00000002 r7:60000013 r6:dfa39d8c r5:83238c00 r4:83238c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522e7c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454ab8c r4:8454a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454ab8c r4:84777480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238c00 r8:847774ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777480 r8:8027f5e8 r7:dfa21e60 r6:8461d800 r5:83238c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99d00 INFO: task kworker/0:8:3132 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bab6a000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3134 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:839f5400 r4:839f5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839f5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ca900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:839f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9eb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c838c r4:853c8000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c838c r4:84777d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:839f5400 r8:84777dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777d80 r8:8027f5e8 r7:dfa21e60 r6:8461d780 r5:839f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99d40 INFO: task kworker/0:9:3134 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bae9f000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa5dd84 r8:00000002 r7:60000013 r6:dfa5dd8c r5:839f6c00 r4:839f6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839f6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bdec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:839f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b6b8c r4:853b6800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b6b8c r4:8461d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:839f6c00 r8:8461d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461d880 r8:8027f5e8 r7:df9d5e60 r6:8461d980 r5:839f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847693c0 INFO: task kworker/1:8:3137 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bb221000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:83256000 r4:83256000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83256000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bd640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83256000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb117000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b778c r4:853b7400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b778c r4:84777d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83256000 r8:84777d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777d00 r8:8027f5e8 r7:dfa49e60 r6:8461d900 r5:83256000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99f00 INFO: task kworker/0:10:3139 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bb4cd000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa8dd84 r8:00000002 r7:60000013 r6:dfa8dd8c r5:844bbc00 r4:844bbc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bbc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595b8c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0e78c r4:85a0e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0e78c r4:8461db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844bbc00 r8:8461db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461db00 r8:8027f5e8 r7:df9d5e60 r6:8461db80 r5:844bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847695c0 INFO: task kworker/1:9:3142 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bb545000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:844bd400 r4:844bd400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548d2c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853cbb8c r4:853cb800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853cbb8c r4:841a4e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844bd400 r8:841a4e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:841a4e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841a4e00 r8:8027f5e8 r7:dfa49e60 r6:8461da80 r5:844bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46040 INFO: task kworker/0:11:3144 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bb9b9000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3145 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:844b8c00 r4:844b8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844b8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548b5c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa69000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546038c r4:85460000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546038c r4:841a4d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b8c00 r8:841a4dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:841a4d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841a4d80 r8:8027f5e8 r7:dfa91e60 r6:8461da00 r5:844b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46040 INFO: task kworker/0:12:3145 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bbc31000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3147 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:844bb000 r4:844bb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559bc00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb439000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e138c r4:854e1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e138c r4:84777f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844bb000 r8:84777f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777f00 r8:8027f5e8 r7:dfa91e60 r6:8461dc00 r5:844bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b300 INFO: task kworker/0:13:3147 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bbe49000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3150 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:844b8000 r4:844b8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844b8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84237f8c r4:84237c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84237f8c r4:83cad800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b8000 r8:83cad82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83cad800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cad800 r8:8027f5e8 r7:dfaa9e60 r6:8461de00 r5:844b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b180 INFO: task kworker/0:14:3150 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bbe49000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83a3bc00 r4:83a3bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a3bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85665700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0537000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e3f8c r4:854e3c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e3f8c r4:830b8780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a3bc00 r8:830b87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:8027f5e8 r7:dfaa9e60 r6:830b8680 r5:83a3bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b240 INFO: task kworker/0:15:3151 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bc16c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3154 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83a38000 r4:83a38000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a38000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85603e00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a38000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e238c r4:854e2000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e238c r4:830b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a38000 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027f5e8 r7:df9d9e60 r6:830b8400 r5:83a38000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b400 INFO: task kworker/0:16:3154 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bc46d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3157 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:83a3a400 r4:83a3a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a3a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bd380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575a38c r4:8575a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575a38c r4:84d2a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a3a400 r8:84d2a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d2a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2a280 r8:8027f5e8 r7:df9d9e60 r6:841a5d80 r5:83a3a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b6c0 INFO: task kworker/0:17:3157 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bc64c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3158 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:83a38c00 r4:83a38c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a38c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565e040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ea78c r4:854ea400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ea78c r4:841a5b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a38c00 r8:841a5b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:841a5b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841a5b00 r8:8027f5e8 r7:dfad5e60 r6:83327900 r5:83a38c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b800 INFO: task kworker/0:18:3158 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bc786000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:83a1ec00 r4:83a1ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85714b8c r4:85714800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85714b8c r4:83327680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a1ec00 r8:833276ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83327680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83327680 r8:8027f5e8 r7:dfad5e60 r6:832bc180 r5:83a1ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b9c0 INFO: task kworker/0:19:3161 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bca37000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3162 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:83a18c00 r4:83a18c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a18c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85836540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85872f8c r4:85872c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85872f8c r4:83842000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a18c00 r8:8384202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83842000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83842000 r8:8027f5e8 r7:dfad5e60 r6:83842900 r5:83a18c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b9c0 INFO: task kworker/0:20:3162 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bcdba000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:83a1c800 r4:83a1c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858350c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85717b8c r4:85717800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85717b8c r4:83842c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a1c800 r8:83842c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83842c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83842c00 r8:8027f5e8 r7:dfaf9e60 r6:83842880 r5:83a1c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b9c0 INFO: task kworker/0:21:3164 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bcdba000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:83a19800 r4:83a19800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a19800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85856100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a19800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca17000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85873b8c r4:85873800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85873b8c r4:83842b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a19800 r8:83842bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83842b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83842b80 r8:8027f5e8 r7:dfaf9e60 r6:8431f180 r5:83a19800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4be40 INFO: task kworker/0:22:3166 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd083000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:83a1bc00 r4:83a1bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f79c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec733000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a578c r4:858a5400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a578c r4:8431f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a1bc00 r8:8431f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8431f100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8431f100 r8:8027f5e8 r7:dfb05e60 r6:83861300 r5:83a1bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b000 INFO: task kworker/0:23:3167 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd083000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3169 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:838b8c00 r4:838b8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85941d40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c3a38c r4:84c3a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c3a38c r4:83861500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b8c00 r8:8386152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83861500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83861500 r8:8027f5e8 r7:dfb11e60 r6:83861400 r5:838b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b180 INFO: task kworker/0:24:3169 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd4a5000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3172 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:844ba400 r4:844ba400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844ba400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84716700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec553000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a5b8c r4:858a5800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a5b8c r4:83861480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844ba400 r8:838614ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83861480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83861480 r8:8027f5e8 r7:dfb11e60 r6:8461df00 r5:844ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b380 INFO: task kworker/0:25:3172 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd4a5000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:844be000 r4:844be000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844be000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844be000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec513000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3078c r4:85a30400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3078c r4:8333c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844be000 r8:8333c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8333c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8333c080 r8:8027f5e8 r7:dfb11e60 r6:8461df80 r5:844be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b400 INFO: task kworker/0:26:3174 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd755000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:838b9800 r4:838b9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84716640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ed000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2b78c r4:85a2b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a2b78c r4:8333c100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b9800 r8:8333c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8333c100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8333c100 r8:8027f5e8 r7:dfb5de60 r6:8333c000 r5:838b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b400 INFO: task kworker/0:27:3175 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd755000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:838ba400 r4:838ba400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838ba400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9e80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f1e1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7e78c r4:85a7e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7e78c r4:8383ab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838ba400 r8:8383abac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8383ab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8383ab80 r8:8027f5e8 r7:dfb5de60 r6:830cc100 r5:838ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b740 INFO: task kworker/0:28:3178 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bda4e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:838bd400 r4:838bd400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838bd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f7200 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f11b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb181000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a678c r4:858a6400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a678c r4:830cc080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bd400 r8:830cc0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cc080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc080 r8:8027f5e8 r7:dfb51e60 r6:84eca000 r5:838bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b740 INFO: task kworker/0:29:3179 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bdc1c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:838be000 r4:838be000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838be000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a59400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838be000 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3f38c r4:85a3f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3f38c r4:84eca080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838be000 r8:84eca0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca080 r8:8027f5e8 r7:dfb51e60 r6:84eca100 r5:838be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5ba80 INFO: task kworker/0:30:3182 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bdc1c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:838bb000 r4:838bb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838bb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230180 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f27b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbd38c r4:84cbd000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbd38c r4:84eca200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bb000 r8:84eca22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca200 r8:8027f5e8 r7:dfb51e60 r6:84eca280 r5:838bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5bc80 INFO: task kworker/0:31:3183 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bdeb2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3186 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:838bec00 r4:838bec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838bec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5c540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f50d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed22f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbdb8c r4:84cbd800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbdb8c r4:84eca300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bec00 r8:84eca32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca300 r8:8027f5e8 r7:dfb79e60 r6:84eca380 r5:838bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5be40 INFO: task kworker/0:32:3186 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: be37c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:83a8bc00 r4:83a8bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a8bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f275000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb133000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a7b8c r4:858a7800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a7b8c r4:84eca400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a8bc00 r8:84eca42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca400 r8:8027f5e8 r7:dfb99e60 r6:84eca480 r5:83a8bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84769680 INFO: task kworker/0:33:3188 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: be57c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3190 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:83a8ec00 r4:83a8ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a8ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a0940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f271000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a9078c r4:85a90400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a9078c r4:84eca500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a8ec00 r8:84eca52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca500 r8:8027f5e8 r7:dfba5e60 r6:84eca580 r5:83a8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb000 INFO: task kworker/0:34:3190 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: be57c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:838bc800 r4:838bc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838bc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f273000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a778c r4:858a7400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a778c r4:84eca600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bc800 r8:84eca62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca600 r8:8027f5e8 r7:dfbb1e60 r6:84eca680 r5:838bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb300 INFO: task kworker/0:35:3192 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: beab7000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:83a88c00 r4:83a88c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a88c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5c440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f509000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1f9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbc38c r4:84cbc000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbc38c r4:84eca700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a88c00 r8:84eca72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca700 r8:8027f5e8 r7:dfbb1e60 r6:84eca780 r5:83a88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb540 INFO: task kworker/0:36:3194 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: beab7000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:83a02400 r4:83a02400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a02400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230ec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a02400 r7:00000000 r6:83018000 r5:00001000 r4:7f26b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a738c r4:858a7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a738c r4:84eca800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a02400 r8:84eca82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca800 r8:8027f5e8 r7:dfb85e60 r6:84eca880 r5:83a02400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb540 INFO: task kworker/0:37:3196 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bedc2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbd5d84 r8:00000002 r7:60000113 r6:dfbd5d8c r5:83a05400 r4:83a05400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a05400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583f9c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a05400 r7:00000000 r6:83018000 r5:00001000 r4:7f4d5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed421000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbcb8c r4:84cbc800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbcb8c r4:84eca900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a05400 r8:84eca92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca900 r8:8027f5e8 r7:dfb85e60 r6:84eca980 r5:83a05400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb7c0 INFO: task kworker/0:38:3199 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bedc2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:83a01800 r4:83a01800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a01800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858405c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a01800 r7:00000000 r6:83018000 r5:00001000 r4:7f449000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbdf8c r4:84cbdc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbdf8c r4:84ecaa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a01800 r8:84ecaa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecaa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecaa00 r8:8027f5e8 r7:dfbd5e60 r6:84ecaa80 r5:83a01800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb900 INFO: task kworker/0:39:3201 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf036000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:8418a400 r4:8418a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8418a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8418a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0ef8c r4:85a0ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0ef8c r4:8461dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8418a400 r8:8461ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461dd80 r8:8027f5e8 r7:df9d5e60 r6:84ecab00 r5:8418a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ec9600 INFO: task kworker/1:10:3202 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf036000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84550000 r4:84550000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84550000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840e00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84550000 r7:00000000 r6:83018000 r5:00001000 r4:7f49f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed243000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0578c r4:85b05400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b0578c r4:84ecab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84550000 r8:84ecabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecab80 r8:8027f5e8 r7:dfbf5e60 r6:84ecac00 r5:84550000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eebd40 INFO: task kworker/0:40:3203 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf36e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:84551800 r4:84551800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84551800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84551800 r7:00000000 r6:83018000 r5:00001000 r4:7f447000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd23000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbe38c r4:84cbe000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbe38c r4:84ecac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84551800 r8:84ecacac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecac80 r8:8027f5e8 r7:dfbf5e60 r6:84ecad00 r5:84551800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eebf80 INFO: task kworker/0:41:3206 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf36e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84552400 r4:84552400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84552400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565b240 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84552400 r7:00000000 r6:83018000 r5:00001000 r4:7f3bb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed205000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbff8c r4:84cbfc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbff8c r4:84ecad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84552400 r8:84ecadac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecad80 r8:8027f5e8 r7:dfbe9e60 r6:84ecae00 r5:84552400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec0c0 INFO: task kworker/0:42:3207 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf56b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3210 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84553c00 r4:84553c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84553c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c0a40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84553c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2fb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec555000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aa238c r4:85aa2000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85aa238c r4:84ecae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84553c00 r8:84ecaeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecae80 r8:8027f5e8 r7:dfc1de60 r6:84ecaf00 r5:84553c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec240 INFO: task kworker/0:43:3210 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf56b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3211 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:84555400 r4:84555400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84555400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558d6c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84555400 r7:00000000 r6:83018000 r5:00001000 r4:7f345000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd3f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbfb8c r4:84cbf800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbfb8c r4:84ecaf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84555400 r8:84ecafac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecaf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecaf80 r8:8027f5e8 r7:dfc21e60 r6:84df2000 r5:84555400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec4c0 INFO: task kworker/0:44:3211 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf915000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:84553000 r4:84553000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84553000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84553000 r7:00000000 r6:83018000 r5:00001000 r4:7f445000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd09000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbe78c r4:84cbe400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbe78c r4:84df2080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84553000 r8:84df20ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2080 r8:8027f5e8 r7:dfc35e60 r6:84df2100 r5:84553000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec740 INFO: task kworker/0:45:3214 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bfb36000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc45d84 r8:00000002 r7:60000113 r6:dfc45d8c r5:84556000 r4:84556000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84556000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0240 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84556000 r7:00000000 r6:83018000 r5:00001000 r4:7f399000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae5f8c r4:85ae5c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae5f8c r4:84df2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84556000 r8:84df21ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2180 r8:8027f5e8 r7:dfc11e60 r6:84df2200 r5:84556000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc45fb0 to 0xdfc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec740 INFO: task kworker/0:46:3215 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bfb36000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:84556c00 r4:84556c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84556c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84556c00 r7:00000000 r6:83018000 r5:00001000 r4:7f443000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbeb8c r4:84cbe800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbeb8c r4:84df2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84556c00 r8:84df22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2280 r8:8027f5e8 r7:dfc11e60 r6:84df2300 r5:84556c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eecac0 INFO: task kworker/0:47:3218 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bfebb000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3219 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:84554800 r4:84554800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84554800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84554800 r7:00000000 r6:83018000 r5:00001000 r4:7f441000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbef8c r4:84cbec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbef8c r4:84df2380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84554800 r8:84df23ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2380 r8:8027f5e8 r7:dfc41e60 r6:84df2400 r5:84554800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eecac0 INFO: task kworker/0:48:3219 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0185000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:84550c00 r4:84550c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84550c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eecb40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84550c00 r7:00000000 r6:83018000 r5:00001000 r4:7f43f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbf38c r4:84cbf000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbf38c r4:84df2480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84550c00 r8:84df24ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2480 r8:8027f5e8 r7:dfc49e60 r6:84df2500 r5:84550c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeccc0 INFO: task kworker/0:49:3222 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0470000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3224 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc55d84 r8:00000002 r7:60000013 r6:dfc55d8c r5:83a06c00 r4:83a06c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a06c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eecd80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a06c00 r7:00000000 r6:83018000 r5:00001000 r4:7f43d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbf78c r4:84cbf400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbf78c r4:84df2580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a06c00 r8:84df25ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2580 r8:8027f5e8 r7:dfc4de60 r6:84df2600 r5:83a06c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eebf80 INFO: task kworker/0:50:3224 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c06b4000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:84ec0000 r4:84ec0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec0000 r7:00000000 r6:83018000 r5:00001000 r4:7f43f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec621000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbcf8c r4:84cbcc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbcf8c r4:84df2680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec0000 r8:84df26ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2680 r8:8027f5e8 r7:dfc55e60 r6:84df2700 r5:84ec0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eebd40 INFO: task kworker/0:51:3226 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c091c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3229 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84ec0c00 r4:84ec0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583f3c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f4f5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed167000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbc78c r4:84cbc400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbc78c r4:84df2780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec0c00 r8:84df27ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2780 r8:8027f5e8 r7:dfc59e60 r6:84df2800 r5:84ec0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e36100 INFO: task kworker/0:52:3229 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0a3d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:84ec1800 r4:84ec1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5c640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec1800 r7:00000000 r6:83018000 r5:00001000 r4:7f50f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed23b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9df8c r4:84e9dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9df8c r4:84df2880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec1800 r8:84df28ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2880 r8:8027f5e8 r7:dfc65e60 r6:84df2900 r5:84ec1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e36340 INFO: task kworker/0:53:3231 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0a3d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3234 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:839f0c00 r4:839f0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839f0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c251c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:839f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed627000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9e78c r4:84e9e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9e78c r4:84df2980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:839f0c00 r8:84df29ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2980 r8:8027f5e8 r7:dfc79e60 r6:8461de80 r5:839f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e36440 INFO: task kworker/0:54:3234 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0a3d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3236 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfcb1d84 r8:00000002 r7:60000013 r6:dfcb1d8c r5:8451b000 r4:8451b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8451b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8451b000 r7:00000000 r6:83018000 r5:00001000 r4:7f5dd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3bb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e6f8c r4:859e6c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e6f8c r4:84df2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451b000 r8:84df2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2a00 r8:8027f5e8 r7:dfca1e60 r6:83fe5800 r5:8451b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb1fb0 to 0xdfcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e364c0 INFO: task kworker/0:55:3236 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: c0dea000 edddd000 00000001 80239b98 7fb69000 00000001 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:56:3237 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:84ec2400 r4:84ec2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e36840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec2400 r7:00000000 r6:83018000 r5:00001000 r4:7f64b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9ef8c r4:84e9ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9ef8c r4:84df2a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec2400 r8:84df2aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2a80 r8:8027f5e8 r7:dfcb1e60 r6:84df2b00 r5:84ec2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e364c0 INFO: task kworker/0:56:3237 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0dea000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:3239 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:84ec3000 r4:84ec3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84e9f38c r4:84df2b80 dfa0: 00000000 00000000 00000000 00000000 r4:84e36800 Workqueue: events bpf_prog_free_deferred Exception stack(0xe883dd28 to 0xe883dd70) r5:80070013 r4:80239bb0 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84ec4800 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed631000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e36800 INFO: task kworker/0:58:3241 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c137d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3242 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfcd9d84 r8:00000002 r7:60000113 r6:dfcd9d8c r5:84ec6000 r4:84ec6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfd0d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859bf38c r4:84df2d80 Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) r4:84e36c40 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/1:11:3244 blocked for more than 451 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8451c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0f38c r4:85a0f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0f38c r4:84db0000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451c800 r8:84db002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84db0000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84db0000 r8:8027f5e8 r7:df9d5e60 r6:84db0080 r5:8451c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ec9fc0 INFO: task kworker/1:11:3244 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c1990000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3247 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:84519800 r4:84519800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84519800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a476c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfc99000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:84fe978c r4:84fe9400 r4:8454d880 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:12 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ef000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3251 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfce5d84 r8:00000002 r7:60000113 r6:dfce5d8c r5:8451bc00 r4:8451bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8451bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8451bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f75d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed16b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bfb8c r4:859bf800 r10:61c88647 r9:8451bc00 r8:84df2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84518000 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec999000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 task:kworker/0:62 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bf78c r4:859bf400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bf78c r4:84df2f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451ec00 r8:84df2fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2f80 r8:8027f5e8 r7:dfcd9e60 r6:84db0400 r5:8451ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c085c0 INFO: task kworker/0:62:3255 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c299d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3257 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed63b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84c9b38c r4:84c09000 1fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844b9800 r4:82918808 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050ec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f6cb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd01000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bef8c r4:859bec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bef8c r4:84c09080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b9800 r8:84c090ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09080 r8:8027f5e8 r7:dfd31e60 r6:84db0500 r5:844b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd39fb0 to 0xdfd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08440 INFO: task kworker/0:64:3258 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c2dd7000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3260 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291880c r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:838bbc00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eda79000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: c3124000 edddd000 00000001 80239b98 7fb69000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:838b0c00 r4:82918808 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b9000 r5:85a1838c r4:85a18000 r10:61c88647 r9:838b0c00 r8:84db062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0f640 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c3124000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:3264 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfd61d84 r8:00000002 r7:60000113 r6:dfd61d8c r5:838b2400 r4:838b2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd61e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5e700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f7e9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5238c r4:85c52000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5238c r4:84c09180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b2400 r8:84c091ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09180 r8:8027f5e8 r7:dfd31e60 r6:84db0700 r5:838b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08940 INFO: task kworker/0:66:3264 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c35fc000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd79e08 r5:00001000 r4:ed6f5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c51f8c r4:85c51c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c51f8c r4:84c09200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b0000 r8:84c0922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09200 r8:8027f5e8 r7:dfd31e60 r6:84db0780 r5:838b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd79fb0 to 0xdfd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08980 INFO: task kworker/0:67:3266 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c35fc000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84518c00 r5:84518c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd89e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5e400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84518c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5178c r4:85c51400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5178c r4:84c09280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84518c00 r8:84c092ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09280 r8:8027f5e8 r7:dfd31e60 r6:84db0800 r5:84518c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd89fb0 to 0xdfd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08c40 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/0:69:3270 blocked for more than 452 seconds. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ed6a9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:00001000 r4:e47a2000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:70 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:dfd55000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c3a34000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3275 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfdbdd84 r8:00000002 r7:60000013 r6:dfdbdd8c r5:84eb3000 r4:84eb3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdbde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfa680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb3000 r7:00000000 r6:83018000 r5:00001000 r4:7f879000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edeb1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84c9ab8c r4:84c09400 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r5:84fe978c r4:84fe9400 r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84eb1800 r4:82918808 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:edc8b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84eb1800 r8:84c094ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfdd5d84 r8:00000002 r7:60000113 r6:dfdd5d8c r5:84eb0000 r4:84eb0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d40440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f8d9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee00b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4cb8c r4:85d4c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4cb8c r4:84c09500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84eb0000 r8:84c0952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09500 r8:8027f5e8 r7:dfd31e60 r6:84db0a80 r5:84eb0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd5fb0 to 0xdfdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dbb000 INFO: task kworker/0:73:3279 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c439b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3281 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3281 tgid:3281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfdb9d84 r8:00000002 r7:60000113 r6:dfdb9d8c r5:84eb3c00 r4:84eb3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb9e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9fb000 r7:ddde2d80 r6:83018200 r5:85a18b8c r4:84db0b00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r5:84fe978c r4:84fe9400 r4:8454d880 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:74 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf9e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee337000 r5:85d4d38c r4:85d4d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dbb240 INFO: task kworker/0:74:3284 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c4ec1000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:3286 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfe01d84 r8:00000002 r7:60000113 r6:dfe01d8c r5:84eb6c00 r4:84eb6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bed7c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f9e5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe21000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4e38c r4:85d4e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca3d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84eb2400 r8:84db0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84db0d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84db0d00 r8:8027f5e8 r7:df9d5e60 r6:84db0d80 r5:84eb2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe0dfb0 to 0xdfe0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84db8140 INFO: task kworker/1:16:3287 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c4ec1000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3289 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfe15d84 r8:00000002 r7:60000113 r6:dfe15d8c r5:84eb6000 r4:84eb6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe15e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c0400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] ( <> 7) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:7289 blocked for more than 477 seconds. r5:847a6000 r4:82918808 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xedb1dfb0 to 0xedb1dff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ac6fd000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 Exception stack(0xe884dfb0 to 0xe884dff8) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85190000 r9:83018005 r8:85190000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ab000 r10:61c88647 r9:85190000 r8:85a566ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847100c0 INFO: task kworker/0:565:7293 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ac786000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:566 state:D stack:0 pid:7294 tgid:7294 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eda1f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:567 state:D stack:0 pid:7296 tgid:7296 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85193000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed98d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d4f8c r4:859d4c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d4f8c r4:85a56880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85193000 r8:85a568ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56880 r8:8027f5e8 r7:edb2de60 r6:85a56900 r5:85193000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb31fb0 to 0xedb31ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: acdc7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84710a80 r5:00001000 r4:eda11000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedb21fb0 to 0xedb21ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r5:00001000 r4:e884f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe884dfb0 to 0xe884dff8) INFO: task kworker/0:569:7303 blocked for more than 477 seconds. r10:8291880c r9:edb41d84 r8:00000002 r7:60000113 r6:edb41d8c r5:85c13000 r5:85c13000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84710c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c13000 r7:00000000 r6:83018000 r5:00001000 r4:7f7b7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda33000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d5b8c r4:859d5800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d5b8c r4:85a56a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c13000 r8:85a56a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56a00 r8:8027f5e8 r7:edb2de60 r6:85924980 r5:85c13000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb41fb0 to 0xedb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847109c0 INFO: task kworker/0:569:7303 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ad00e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eda4f000 r5:859d638c r4:859d6000 r4:85a56a80 Exception stack(0xedb49fb0 to 0xedb49ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85c15400 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eda41000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d5f8c r4:85a56b00 Exception stack(0xedb4dfb0 to 0xedb4dff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:7310 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:7310 tgid:7310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edb5dd84 r8:00000002 r7:60000113 r6:edb5dd8c r5:85c19800 r4:85c19800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c19800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb5de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84710700 r4:00000000 r9:83018005 r8:85c19800 r7:00000000 r6:83018000 r5:00001000 r4:7f7bd000 r5:00001000 r4:eda5b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d678c r4:85a56b80 Exception stack(0xedb5dfb0 to 0xedb5dff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85c18000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb61e08 r5:00001000 r4:edbb5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d838c r4:85a56c00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:574:7312 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:574 state:D stack:0 pid:7312 tgid:7312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edb69d84 r8:00000002 r7:60000013 r6:edb69d8c r5:85c1a400 r4:85c1a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c1a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb69e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08500 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f7bf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d6b8c r4:859d6800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d6b8c r4:85a56c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c1a400 r8:85a56cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56c80 r8:8027f5e8 r7:edb61e60 r6:85924c00 r5:85c1a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb69fb0 to 0xedb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84710800 INFO: task kworker/0:574:7312 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: add2b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:00001000 r4:e884f000 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred r5:85c1c800 r4:82918808 r4:00000000 r9:83018005 r8:85c1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f7c1000 r5:00001000 r4:edb65000 r7:dddced80 r6:83018000 r5:859d6f8c r4:85a56d00 r10:00000000 r9:85a56d00 r8:8027f5e8 r7:edb61e60 r6:85924c80 r5:85c1c800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ee7e00 INFO: task kworker/0:575:7314 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: adfd4000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:7316 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:7316 tgid:7316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edb81d84 r8:00000002 r7:60000113 r6:edb81d8c r5:85c1b000 r4:85c1b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c1b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb81e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9f040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f7c3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb75000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d738c r4:859d7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d738c r4:85a56d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c1b000 r8:85a56dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56d80 r8:8027f5e8 r7:edb61e60 r6:85924d00 r5:85c1b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb81fb0 to 0xedb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ee7e00 INFO: task kworker/0:576:7316 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ae238000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edb89000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d778c r4:859d7400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85c1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7c7000 r5:00001000 r4:edb99000 r5:859d7b8c r4:859d7800 r4:85a56e80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd20: aeea1000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:7323 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:7323 tgid:7323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edbbdd84 r8:00000002 r7:60000113 r6:edbbdd8c r5:85c1bc00 r4:85c1bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c1bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbbde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:edba5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85c1bc00 r8:85a56f2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edbc5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d878c r4:85a56f80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: af627000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:581 state:D stack:0 pid:7327 tgid:7327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edbe5d84 r8:00000002 r7:60000013 r6:edbe5d8c r5:85ac0c00 r4:85ac0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbe5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9fa80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ac0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbe1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d8f8c r4:859d8c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d8f8c r4:84715000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac0c00 r8:8471502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715000 r8:8027f5e8 r7:edbcde60 r6:85924f80 r5:85ac0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbe5fb0 to 0xedbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d9f680 INFO: task kworker/0:581:7327 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: afe8d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edbd5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d8b8c r4:84715080 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: afe8d000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:7331 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:7331 tgid:7331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edbd9d84 r8:00000002 r7:60000113 r6:edbd9d8c r5:85193c00 r4:85193c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85193c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbd9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9fb40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85193c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbf1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d938c r4:859d9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d938c r4:84715180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85193c00 r8:847151ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715180 r8:8027f5e8 r7:edbe5e60 r6:84715200 r5:85193c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbd9fb0 to 0xedbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d9fa00 INFO: task kworker/0:583:7331 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: afe8d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:584 state:D stack:0 pid:7332 tgid:7332 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbf5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9fd80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85194800 r7:00000000 r6:83018000 r5:00001000 r4:7f7d5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbfd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d978c r4:859d9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85194800 r8:847152ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc09000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:7338 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:7338 tgid:7338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc0dd84 r8:00000002 r7:60000113 r6:edc0dd8c r5:85196000 r4:85196000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85196000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc0de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85196000 r7:00000000 r6:83018000 r5:00001000 r4:7f7db000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc21000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859da38c r4:859da000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859da38c r4:84715480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85196000 r8:847154ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715480 r8:8027f5e8 r7:edc01e60 r6:84715500 r5:85196000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc0dfb0 to 0xedc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d9fc80 INFO: task kworker/0:586:7338 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b0660000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:edb35d84 r8:00000002 r7:60000013 r6:edb35d8c r5:85196c00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9ffc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85196c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d9f8c r4:859d9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d9f8c r4:84715580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85196c00 r8:847155ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715580 r8:8027f5e8 r7:edc0de60 r6:84715600 r5:85196c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb35fb0 to 0xedb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58080 INFO: task kworker/0:587:7339 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b0660000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:588 state:D stack:0 pid:7342 tgid:7342 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc2d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84715680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: b0c46000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:847a6c00 r4:82918808 r4:00000000 r4:00000000 r5:00001000 r4:edc39000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859dab8c r4:84715780 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58200 INFO: task kworker/0:589:7343 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b0c46000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:7345 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:7345 tgid:7345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc45d84 r8:00000002 r7:60000013 r6:edc45d8c r5:85188c00 r4:85188c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85188c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85188c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7e3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc4d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859daf8c r4:859dac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859daf8c r4:84715880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85188c00 r8:847158ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715880 r8:8027f5e8 r7:edc25e60 r6:84715900 r5:85188c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc45fb0 to 0xedc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a583c0 INFO: task kworker/0:590:7345 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b123a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8518a400 r4:82918808 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58e40 r5:00001000 r4:edc71000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859dbb8c r4:859db800 r10:61c88647 r9:8518a400 r8:847159ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b123a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:7350 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:7350 tgid:7350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc69d84 r8:00000002 r7:60000013 r6:edc69d8c r5:8518b000 r4:8518b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8518b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc69e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58ac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518b000 r7:00000000 r6:83018000 r5:00001000 r4:7f7e5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc59000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859db38c r4:859db000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84715a80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:edc75d84 r8:00000002 r7:60000013 r6:edc75d8c r5:85189800 r4:00000000 r4:00000000 r5:00001000 r4:edc65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859db78c r4:859db400 r10:61c88647 r9:85189800 r8:84715bac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: b1d2f000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:7354 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:7354 tgid:7354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc81d84 r8:00000002 r7:60000013 r6:edc81d8c r5:8518c800 r4:8518c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8518c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc81e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518c800 r7:00000000 r6:83018000 r5:00001000 r4:7f7eb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc7d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859dbf8c r4:859dbc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859dbf8c r4:84715c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518c800 r8:84715cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715c80 r8:8027f5e8 r7:edc5de60 r6:84715d00 r5:8518c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc81fb0 to 0xedc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58cc0 INFO: task kworker/0:594:7354 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b1d2f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r5:80070013 r4:80239bb0 r4:e884ddc0 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:595 state:D stack:0 pid:7356 tgid:7356 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc51e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcb1000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84715d80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8518d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc31e08 r5:00001000 r4:edc89000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85c0c38c r4:84715e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518d400 r8:84715eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715e80 r8:8027f5e8 r7:edc51e60 r6:84715f00 r5:8518d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc31fb0 to 0xedc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b240 INFO: task kworker/0:596:7359 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b2550000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:7361 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:7361 tgid:7361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc9dd84 r8:00000002 r7:60000013 r6:edc9dd8c r5:8518e000 r4:8518e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8518e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc9de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593b300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518e000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ef000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0c78c r4:85c0c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0c78c r4:84715f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:598 state:D stack:0 pid:7363 tgid:7363 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edca9e08 r9:83018005 r8:8518ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7f1000 r5:00001000 r4:edc99000 r7:dddced80 r6:83018000 r5:85c0cb8c r4:85929080 r10:61c88647 r9:8518ec00 r8:859290ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929080 r8:8027f5e8 r7:edc51e60 r6:85929100 r5:8518ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedca9fb0 to 0xedca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b340 INFO: task kworker/0:598:7363 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b291d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:7364 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:7364 tgid:7364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcb5d84 r8:00000002 r7:60000013 r6:edcb5d8c r5:85188000 r4:85188000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85188000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcb5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593b600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85188000 r7:00000000 r6:83018000 r5:00001000 r4:7f7f3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edca5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0cf8c r4:85c0cc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0cf8c r4:85929180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85188000 r8:859291ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929180 r8:8027f5e8 r7:edc51e60 r6:85929200 r5:85188000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcb5fb0 to 0xedcb5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b480 INFO: task kworker/0:599:7364 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b291d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:7367 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:7367 tgid:7367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcc1d84 r8:00000002 r7:60000113 r6:edcc1d8c r5:85192400 r4:85192400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85192400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcc1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593b940 r4:00000000 r9:83018005 r8:85192400 r7:00000000 r6:83018000 r5:00001000 r4:7f7f7000 r5:00001000 r4:edcbd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0d78c r4:85c0d400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0d78c r4:85929280 r10:61c88647 r9:85192400 r8:859292ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:8593b640 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:7368 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:7368 tgid:7368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcd5d84 r8:00000002 r7:60000113 r6:edcd5d8c r5:859a0000 r4:859a0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcd5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593bbc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f7f9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcc9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0db8c r4:85c0d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0db8c r4:85929380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a0000 r8:859293ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929380 r8:8027f5e8 r7:edcc1e60 r6:85929400 r5:859a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcd5fb0 to 0xedcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b740 INFO: task kworker/0:601:7368 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b33da000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:7371 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:7371 tgid:7371 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r4:859a0c00 r5:859a0c00 r4:82918808 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edccde08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:edd15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0f38c r4:85c0f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0f38c r4:85929480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a0c00 r8:859294ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929480 r8:8027f5e8 r7:edcd5e60 r6:85929500 r5:859a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedccdfb0 to 0xedccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b8c0 INFO: task kworker/0:602:7371 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b33da000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:603:7372 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:603 state:D stack:0 pid:7372 tgid:7372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edce9d84 r8:00000002 r7:60000013 r6:edce9d8c r5:859a1800 r4:859a1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edce9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593bcc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f7fb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcd9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0df8c r4:85c0dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0df8c r4:85929580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a1800 r8:859295ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929580 r8:8027f5e8 r7:edccde60 r6:85929600 r5:859a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedce9fb0 to 0xedce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b9c0 INFO: task kworker/0:603:7372 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b33da000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:7375 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:7375 tgid:7375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcf5d84 r8:00000002 r7:60000113 r6:edcf5d8c r5:859a2400 r4:859a2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcf5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593be40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f7fd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edce5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0e38c r4:85c0e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0e38c r4:85929680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a2400 r8:859296ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929680 r8:8027f5e8 r7:edccde60 r6:85929700 r5:859a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcf5fb0 to 0xedcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593bc40 INFO: task kworker/0:604:7375 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b33da000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:7376 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:7376 tgid:7376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd01d84 r8:00000002 r7:60000013 r6:edd01d8c r5:859a3000 r4:859a3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593bfc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ff000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcf1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0e78c r4:85c0e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0e78c r4:85929780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a3000 r8:859297ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929780 r8:8027f5e8 r7:edccde60 r6:85929800 r5:859a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd01fb0 to 0xedd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58640 INFO: task kworker/0:605:7376 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b3a5b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:7378 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:7378 tgid:7378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcddd84 r8:00000002 r7:60000113 r6:edcddd8c r5:859a3c00 r4:859a3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcdde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58f40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f801000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcfd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0eb8c r4:85c0e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0eb8c r4:85929880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a3c00 r8:859298ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929880 r8:8027f5e8 r7:edccde60 r6:85929900 r5:859a3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcddfb0 to 0xedcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58640 INFO: task kworker/0:606:7378 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b3ee0000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:00001000 r4:e884f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:859a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f803000 r5:00001000 r4:edd09000 r7:dddced80 r6:83018000 r5:85c0ef8c r4:85929980 r10:00000000 r9:85929980 r8:8027f5e8 r7:edccde60 r6:85929a00 r5:859a4800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869080 INFO: task kworker/0:607:7380 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b4478000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:7382 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:7382 tgid:7382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd19d84 r8:00000002 r7:60000113 r6:edd19d8c r5:859a5400 r4:859a5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd19e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858695c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f809000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd2d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0fb8c r4:85c0f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0fb8c r4:85929a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a5400 r8:85929aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929a80 r8:8027f5e8 r7:edccde60 r6:85929b00 r5:859a5400 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:e884ddc0 r4:00000000 r5:00001000 r4:e884f000 r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:7384 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:7384 tgid:7384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd25d84 r8:00000002 r7:60000113 r6:edd25d8c r5:859a6000 r4:859a6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd25e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f807000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd21000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0f78c r4:85c0f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0f78c r4:85929b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a6000 r8:85929bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929b80 r8:8027f5e8 r7:edd19e60 r6:85929c00 r5:859a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd25fb0 to 0xedd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869280 INFO: task kworker/0:609:7384 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b4478000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:7388 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:610 state:D stack:0 pid:7388 tgid:7388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd31d84 r8:00000002 r7:60000113 r6:edd31d8c r5:859a6c00 r4:859a6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd31e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f765000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed545000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5038c r4:85c50000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5038c r4:85929c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a6c00 r8:85929cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929c80 r8:8027f5e8 r7:edd19e60 r6:85929d00 r5:859a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd31fb0 to 0xedd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85869440 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454db00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84d78000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d78000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edae1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d78000 r7:00000000 r6:83018000 r5:00001000 r4:7f763000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0ff8c r4:85c0fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0ff8c r4:85929d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d78000 r8:85929dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929d80 r8:8027f5e8 r7:edd31e60 r6:85929e00 r5:84d78000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedae1fb0 to 0xedae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869440 INFO: task kworker/0:611:7392 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5299000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84e5aa80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291880c r9:edac1d84 r8:00000002 r7:60000113 r6:edac1d8c r5:84d78c00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed6d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85c5078c r4:85929e80 r4:85929e80 Exception stack(0xedac1fb0 to 0xedac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869780 INFO: task kworker/0:612:7396 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5299000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:7402 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:7402 tgid:7402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd3dd84 r8:00000002 r7:60000113 r6:edd3dd8c r5:84d79800 r4:84d79800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d79800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd3de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869dc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d79800 r7:00000000 r6:83018000 r5:00001000 r4:7f773000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c50b8c r4:85c50800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c50b8c r4:85929f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d79800 r8:85929fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929f80 r8:8027f5e8 r7:edac1e60 r6:85937000 r5:84d79800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd3dfb0 to 0xedd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869ac0 INFO: task kworker/0:613:7402 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b574e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:7405 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:7405 tgid:7405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd41d84 r8:00000002 r7:60000113 r6:edd41d8c r5:84d7b000 r4:84d7b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9cc80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f77b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7dd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5138c r4:85c51000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5138c r4:85937080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d7b000 r8:859370ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937080 r8:8027f5e8 r7:edd3de60 r6:85937100 r5:84d7b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd41fb0 to 0xedd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869bc0 INFO: task kworker/0:614:7405 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5dc9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:7406 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:7406 tgid:7406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd45d84 r8:00000002 r7:60000113 r6:edd45d8c r5:84d7bc00 r4:84d7bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869a40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f779000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7b3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c50f8c r4:85c50c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c50f8c r4:85937180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d7bc00 r8:859371ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937180 r8:8027f5e8 r7:edd41e60 r6:85937200 r5:84d7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd45fb0 to 0xedd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869bc0 INFO: task kworker/0:615:7406 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5dc9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:7410 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:7410 tgid:7410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edacdd84 r8:00000002 r7:60000113 r6:edacdd8c r5:84d7c800 r4:84d7c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edacde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5e840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d7c800 r7:00000000 r6:83018000 r5:00001000 r4:7f811000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed173000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c52f8c r4:85c52c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84d9c400 Workqueue: events bpf_prog_free_deferred Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5dc9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:7493 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:7493 tgid:7493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eddedd84 r8:00000002 r7:60000113 r6:eddedd8c r5:84d7e000 r4:84d7e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c0aa80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d7e000 r7:00000000 r6:83018000 r5:00001000 r4:7f819000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb79000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5338c r4:85c53000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5338c r4:85937380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d7e000 r8:859373ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937380 Exception stack(0xeddedfb0 to 0xeddedff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe884dfb0 to 0xe884dff8) Workqueue: events bpf_prog_free_deferred [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edb8d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85c5378c r4:85937480 r10:61c88647 r9:84d7ec00 r8:859374ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937480 r8:8027f5e8 r7:eddede60 r6:85937500 r5:84d7ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedde1fb0 to 0xedde1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a5ee80 INFO: task kworker/0:618:7495 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5eb0000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:619 state:D stack:0 pid:7498 tgid:7498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edbc9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce67c0 INFO: task kworker/0:619:7498 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b62e9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:620:7500 blocked for more than 478 seconds. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Workqueue: events bpf_prog_free_deferred r4:82ac11a4 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) task:kworker/0:621 state:D stack:0 pid:7503 tgid:7503 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:851b0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddf9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfaf00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edc9f000 r7:dddced80 r6:83018000 r5:84c99b8c r4:85937780 r10:00000000 r9:85937780 r8:8027f5e8 r7:eddf1e60 r6:85937800 r5:851b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeddf9fb0 to 0xeddf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84c08c00 r4:82ac11a4 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 INFO: task kworker/0:622:7505 blocked for more than 478 seconds. r4:00000000 r5:00001000 r4:edbdd000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c9a78c r4:85937880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b0c00 r8:859378ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937880 r8:8027f5e8 r7:eddf9e60 r6:85937900 r5:851b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede01fb0 to 0xede01ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000001 task:kworker/0:623 state:D stack:0 pid:7507 tgid:7507 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:edc61000 r7:dddced80 r6:83018000 r5:84c9a38c r4:85937980 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:7522 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:7522 tgid:7522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ede2dd84 r8:00000002 r7:60000113 r6:ede2dd8c r5:851b4800 r4:851b4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede2de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfa780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edeb9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018005 r8:851b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f891000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xedec5fb0 to 0xedec5ff8) r4:85bfae80 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:00001000 r4:ed70d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5c78c r4:85c5c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5c78c r4:85937c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b6c00 r8:85937cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937c80 r8:8027f5e8 r7:edec5e60 r6:85937d00 r5:851b6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedee9fb0 to 0xedee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000001 task:kworker/0:627 state:D stack:0 pid:7579 tgid:7579 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:edce1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe884dd28 to 0xe884dd70) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed6a7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5c38c r4:85c5c000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5c38c r4:85937e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b6000 r8:85937eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937e80 r8:8027f5e8 r7:edee9e60 r6:85937f00 r5:851b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf11fb0 to 0xedf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfab80 INFO: task kworker/0:628:7588 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b797b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r7:dddced80 r6:83018000 r5:85c5cb8c r4:85937f80 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r5:85cc8c00 r4:82918808 r9:83018005 r8:85cc8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8b1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5cf8c r4:85cfe080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cc8c00 r8:85cfe0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfe080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfe080 r8:8027f5e8 r7:edf29e60 r6:85cfe100 r5:85cc8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf25fb0 to 0xedf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85cfd380 INFO: task kworker/0:630:7598 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b7f50000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:7600 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed861000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:632:7602 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:632 state:D stack:0 pid:7602 tgid:7602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edf35d84 r8:00000002 r7:60000013 r6:edf35d8c r5:85ccb000 r4:85ccb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ccb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf35e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed91f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xedf35fb0 to 0xedf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85cfd7c0 INFO: task kworker/0:632:7602 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:8454db00 INFO: task kworker/0:633:7603 blocked for more than 478 seconds. [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85c5d78c r4:85c5d400 Exception stack(0xedf39fb0 to 0xedf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85cfda40 INFO: task kworker/0:633:7603 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b847f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e884ddc0 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:634:7607 blocked for more than 478 seconds. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cfdfc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ccc800 r7:00000000 r6:83018000 r5:00001000 r4:7f8bb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed969000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5df8c r4:85c5dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5df8c r4:85cfe480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ccc800 r8:85cfe4ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85cc8000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85cfde40 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:636:7611 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:636 state:D stack:0 pid:7611 tgid:7611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edf45d84 r8:00000002 r7:60000113 r6:edf45d8c r5:85cce000 r4:85cce000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85cce000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d010c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cce000 r7:00000000 r6:83018000 r5:00001000 r4:7f8bf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda29000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85d01000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454db00 INFO: task kworker/0:637:7613 blocked for more than 478 seconds. r4:00000000 r5:00001000 r4:eda55000 r5:85c5eb8c r4:85c5e800 Exception stack(0xedf0dfb0 to 0xedf0dff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:00000001 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf4de08 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d01c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f8c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edeab000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5fb8c r4:85c5f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5fb8c r4:85cfe880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b5400 r8:85cfe8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfe880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfe880 r8:8027f5e8 r7:edf0de60 r6:85cfe900 r5:851b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf4dfb0 to 0xedf4dff8) Workqueue: events bpf_prog_free_deferred [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85ccbc00 r8:85cfe9ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe884dd28 to 0xe884dd70) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:85cfea80 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b95e1000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ede9f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedf49fb0 to 0xedf49ff8) r4:85d01640 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:8536b000 r4:00000000 r4:00000000 r5:00001000 r4:edf71000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85c6838c r4:85cfec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536b000 r8:85cfecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfec80 r8:8027f5e8 r7:edf4de60 r6:85cfed00 r5:8536b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf5dfb0 to 0xedf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d01640 INFO: task kworker/0:642:7622 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b9ab8000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:7624 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8536a400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edf19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 dd60: 80230ad4 80239bb0 80070013 ffffffff [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:7629 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:7629 tgid:7629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edf7dd84 r8:00000002 r7:60000013 r6:edf7dd8c r5:85c20c00 r4:85c20c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c20c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf7de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d072c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8d3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf79000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6878c r4:85c68400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6878c r4:85cfee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c20c00 r8:85cfee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfee00 r8:8027f5e8 r7:edf5de60 r6:8592c080 r5:85c20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf7dfb0 to 0xedf7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:edf95d84 r8:00000002 r7:60000113 r6:edf95d8c r5:85c20000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edf85000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedf95fb0 to 0xedf95ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:646 state:D stack:0 pid:7633 tgid:7633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:edfa1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6938c r4:85c69000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6938c r4:85cfef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85369800 r8:85cfef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfef00 r8:8027f5e8 r7:edf95e60 r6:85cfef80 r5:85369800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf69fb0 to 0xedf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d07140 INFO: task kworker/0:646:7633 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ba39e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:647 state:D stack:0 pid:7635 tgid:7635 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:8536c800 r7:00000000 r6:83018000 r5:00001000 r4:7f8d7000 r5:00001000 r4:edf91000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r4:84e5aa80 task:kworker/0:648 state:D stack:0 pid:7637 tgid:7637 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edfb9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8536d400 r8:85d0212c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d07500 INFO: task kworker/0:648:7637 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ba7d7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:7638 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:649 state:D stack:0 pid:7638 tgid:7638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:8536e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf59e08 r5:00001000 r4:edfad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85d02200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edfc5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedfb1fb0 to 0xedfb1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:7643 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:7643 tgid:7643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edfc9d84 r8:00000002 r7:60000113 r6:edfc9d8c r5:8536bc00 r4:8536bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8536bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfc9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d07d00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8536bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f8e1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfd1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6a38c r4:85c6a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6a38c r4:85d02400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536bc00 r8:85d0242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02400 r8:8027f5e8 r7:edfb1e60 r6:85d02480 r5:8536bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedfc9fb0 to 0xedfc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d07880 INFO: task kworker/0:651:7643 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bb00e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) INFO: task kworker/0:652:7645 blocked for more than 478 seconds. r4:85ccec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfd5e08 r5:00001000 r4:edfe9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85c6ab8c r4:85d02500 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:00000000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:edfdd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6a78c r4:85c6a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6a78c r4:85d02600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cd0000 r8:85d0262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02600 r8:8027f5e8 r7:edfd5e60 r6:85d02680 r5:85cd0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedfe1fb0 to 0xedfe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d07dc0 INFO: task kworker/0:653:7647 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bb1be000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:654:7649 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:654 state:D stack:0 pid:7649 tgid:7649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edfedd84 r8:00000002 r7:60000113 r6:edfedd8c r5:85cd0c00 r4:85cd0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85cd0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edff5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c6af8c r4:85c6ac00 r10:61c88647 r9:85cd0c00 r8:85d0272c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:7651 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:7651 tgid:7651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edff9d84 r8:00000002 r7:60000113 r6:edff9d8c r5:85cd1800 r4:85cd1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85cd1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edff9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfe0c0 r5:00001000 r4:ee001000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85cd1800 r8:85d0282c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85cd2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee005e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee00d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee005fb0 to 0xee005ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:657:7655 blocked for more than 478 seconds. r4:85cd3000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee011e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfe4c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cd3000 r7:00000000 r6:83018000 r5:00001000 r4:7f8ed000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee019000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6bb8c r4:85c6b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6bb8c r4:85d02a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cd3000 r8:85d02a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02a00 r8:8027f5e8 r7:ee005e60 r6:85d02a80 r5:85cd3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee011fb0 to 0xee011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfe200 INFO: task kworker/0:657:7655 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bb9ec000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ee025000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ee031000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7038c r4:85d02c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cd4800 r8:85d02c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02c00 r8:8027f5e8 r7:ee01de60 r6:85d02c80 r5:85cd4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee029fb0 to 0xee029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfe440 INFO: task kworker/0:659:7659 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bc04d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:7661 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:7661 tgid:7661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85cd6000 r4:00000000 r9:83018005 r8:85cd6000 r7:00000000 r6:83018000 r5:00001000 r4:7f88f000 r5:00001000 r4:ed12b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85cd6000 r8:85d02d2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84e5aa80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85ce0000 r7:00000000 r6:83018000 r5:00001000 r4:7f88d000 r5:00001000 r4:dfd95000 r5:85c7078c r4:85c70400 r10:61c88647 r9:85ce0000 r8:85d02e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02e00 r8:8027f5e8 r7:edfbde60 r6:85d02e80 r5:85ce0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee041fb0 to 0xee041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfe880 INFO: task kworker/0:661:7663 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bc280000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:7665 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:7665 tgid:7665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee045d84 r8:00000002 r7:60000113 r6:ee045d8c r5:85ce1800 r4:85ce1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ce1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee045e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85ce1800 r7:00000000 r6:83018000 r5:00001000 r4:7f895000 r5:00001000 r4:edb71000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee045fb0 to 0xee045ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 r4:85ce2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee049e08 r9:83018005 r8:85ce2400 r7:00000000 r6:83018000 r5:00001000 r4:7f891000 r5:00001000 r4:edad1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee049fb0 to 0xee049ff8) r4:85bfe700 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee035d84 r8:00000002 r7:60000113 r6:ee035d8c r5:85ce3000 r4:85ce3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ce3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee035e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d07f80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ce3000 r7:00000000 r6:83018000 r5:00001000 r4:7f8f3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb93000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c7178c r4:85c71400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7178c r4:85bf7100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ce3000 r8:85bf712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7100 r8:8027f5e8 r7:ee045e60 r6:85bf7180 r5:85ce3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee035fb0 to 0xee035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfee80 INFO: task kworker/0:664:7669 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bca6b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:665 state:D stack:0 pid:7671 tgid:7671 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edbbf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: bca6b000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:666 state:D stack:0 pid:7674 tgid:7674 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee051e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be60c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ce4800 r7:00000000 r6:83018000 r5:00001000 r4:7f8f7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbdb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c71f8c r4:85c71c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c71f8c r4:85bf7300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ce4800 r8:85bf732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7300 r8:8027f5e8 r7:ee04de60 r6:85bf7380 r5:85ce4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee051fb0 to 0xee051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6000 INFO: task kworker/0:666:7674 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bd27f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:7675 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:7675 tgid:7675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85ce5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee055e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6380 r5:00001000 r4:edc03000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:edc2b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85ce6c00 r8:85bf752c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: bd920000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:7678 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:7678 tgid:7678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee05dd84 r8:00000002 r7:60000113 r6:ee05dd8c r5:85ce0c00 r4:85ce0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ce0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee05de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be66c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ce0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8fd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c72b8c r4:85c72800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c72b8c r4:85bf7600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ce0c00 r8:85bf762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7600 r8:8027f5e8 r7:df98de60 r6:85bf7680 r5:85ce0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee05dfb0 to 0xee05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6340 INFO: task kworker/0:669:7678 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:670 state:D stack:0 pid:7682 tgid:7682 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6900 r5:00001000 r4:edc7b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6840 INFO: task kworker/0:670:7682 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: be4ac000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:7683 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:7683 tgid:7683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6800 r5:00001000 r4:edc5f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c72f8c r4:85c72c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c72f8c r4:85bf7800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cd6c00 r8:85bf782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7800 r8:8027f5e8 r7:ee059e60 r6:85bf7880 r5:85cd6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee061fb0 to 0xee061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6680 INFO: task kworker/0:671:7683 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edc93000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c7378c r4:85c73400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:673:7688 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:673 state:D stack:0 pid:7688 tgid:7688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee069d84 r8:00000002 r7:60000013 r6:ee069d8c r5:84c68000 r4:84c68000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c68000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee069e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6c40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c68000 r7:00000000 r6:83018000 r5:00001000 r4:7f905000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c73b8c r4:85c73800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c73b8c r4:85bf7a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c68000 r8:85bf7a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7a00 r8:8027f5e8 r7:ee065e60 r6:85bf7a80 r5:84c68000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee069fb0 to 0xee069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6980 INFO: task kworker/0:673:7688 is blocked on a mutex likely owned by task kworker/1:174:3878. Workqueue: events bpf_prog_free_deferred dd20: befaf000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:674 state:D stack:0 pid:7689 tgid:7689 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edccf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c73f8c r4:85c73c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: befaf000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6f80 r5:00001000 r4:edceb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8508c38c r4:85bf7c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee075fb0 to 0xee075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6c80 INFO: task kworker/0:675:7692 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bf80b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:7694 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:7694 tgid:7694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee079d84 r8:00000002 r7:60000013 r6:ee079d8c r5:84c6a400 r4:84c6a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee079e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a67180 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c6a400 r7:00000000 r6:83018000 r5:00001000 r4:7f90d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd27000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508cb8c r4:8508c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508cb8c r4:85bf7d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6a400 r8:85bf7d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7d00 r8:8027f5e8 r7:ee075e60 r6:85bf7d80 r5:84c6a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee079fb0 to 0xee079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6d80 INFO: task kworker/0:676:7694 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:677:7695 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:677 state:D stack:0 pid:7695 tgid:7695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee06dd84 r8:00000002 r7:60000113 r6:ee06dd8c r5:84c6b000 r4:84c6b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee06de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d048c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c6b000 r7:00000000 r6:83018000 r5:00001000 r4:7f90b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd05000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508c78c r4:8508c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508c78c r4:85bf7e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6b000 r8:85bf7e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7e00 r8:8027f5e8 r7:ee079e60 r6:85bf7e80 r5:84c6b000 r4:85be6f00 Workqueue: events bpf_prog_free_deferred dd20: bfe7e000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edf03000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8508d78c r4:8508d400 r10:61c88647 r9:84c6bc00 r8:85bf7f2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: bfe7e000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 task:kworker/0:679 state:D stack:0 pid:7700 tgid:7700 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee081e08 r9:83018005 r8:84c6c800 r7:00000000 r6:83018000 r5:00001000 r4:7f90f000 r5:00001000 r4:ede45000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: c08fc000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:7701 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:7701 tgid:7701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee085d84 r8:00000002 r7:60000013 r6:ee085d8c r5:84c6d400 r4:84c6d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee085e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a67440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c6d400 r7:00000000 r6:83018000 r5:00001000 r4:7f911000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edef7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508d38c r4:8508d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508d38c r4:84ee6100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6d400 r8:84ee612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6100 r8:8027f5e8 r7:ee07de60 r6:84ee6180 r5:84c6d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee085fb0 to 0xee085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a67140 INFO: task kworker/0:680:7701 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c08fc000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84c6e000 r4:82918808 r4:00000000 r4:00000000 r5:00001000 r4:ee095000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: c0b3d000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) r4:84e5aa80 task:kworker/0:682 state:D stack:0 pid:7705 tgid:7705 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a67840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f915000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508db8c r4:8508d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508db8c r4:84ee6300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6ec00 r8:84ee632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6300 r8:8027f5e8 r7:ee08de60 r6:84ee6380 r5:84c6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee089fb0 to 0xee089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a676c0 INFO: task kworker/0:682:7705 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c13de000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:7708 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:7708 tgid:7708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee0a5d84 r8:00000002 r7:60000113 r6:ee0a5d8c r5:85390000 r4:85390000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85390000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0a5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a678c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85390000 r7:00000000 r6:83018000 r5:00001000 r4:7f91b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0ad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508e78c r4:8508e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508e78c r4:84ee6400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85390000 r8:84ee642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6400 r8:8027f5e8 r7:ee08de60 r6:84ee6480 r5:85390000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0a5fb0 to 0xee0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a67740 INFO: task kworker/0:683:7708 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c1ba7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 Not tainted 6.15.0-syzkaller #0 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ee0a1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8508e38c r4:84ee6500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:7711 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:7711 tgid:7711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee0b1d84 r8:00000002 r7:60000013 r6:ee0b1d8c r5:85391800 r4:85391800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85391800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0b1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a67dc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85391800 r7:00000000 r6:83018000 r5:00001000 r4:7f91d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0b9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508eb8c r4:8508e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508eb8c r4:84ee6600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85391800 r8:84ee662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6600 r8:8027f5e8 r7:ee0a5e60 r6:84ee6680 r5:85391800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0b1fb0 to 0xee0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a67d00 INFO: task kworker/0:685:7711 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c1ba7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85392400 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ee0c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ee6700 r8:8027f5e8 r7:ee0b1e60 r6:84ee6780 r5:85392400 r4:84ce4000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:687 state:D stack:0 pid:7715 tgid:7715 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0d5e08 r4:00000000 r5:00001000 r4:ee0d1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c291b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:7717 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:7717 tgid:7717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee0c9d84 r8:00000002 r7:60000013 r6:ee0c9d8c r5:85393c00 r4:85393c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85393c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0c9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce4380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85393c00 r7:00000000 r6:83018000 r5:00001000 r4:7f923000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0dd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508f78c r4:8508f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508f78c r4:84ee6900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85393c00 r8:84ee692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6900 r8:8027f5e8 r7:ee0d5e60 r6:84ee6980 r5:85393c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0c9fb0 to 0xee0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce42c0 INFO: task kworker/0:688:7717 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c291b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) INFO: task kworker/0:689:7719 blocked for more than 479 seconds. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ee0e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508fb8c r4:8508f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508fb8c r4:84ee6a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85394800 r8:84ee6a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6a00 r8:8027f5e8 r7:ee0c9e60 r6:84ee6a80 r5:85394800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0e1fb0 to 0xee0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce4200 INFO: task kworker/0:689:7719 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c291b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:7721 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce4840 r5:00001000 r4:ee101000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d3438c r4:85d34000 r10:61c88647 r9:85395400 r8:84ee6b2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 task:kworker/0:691 state:D stack:0 pid:7723 tgid:7723 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce46c0 r5:00001000 r4:ee0f5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:7725 tgid:7725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee105d84 r8:00000002 r7:60000113 r6:ee105d8c r5:85396c00 r4:85396c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85396c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee105e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce49c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85396c00 r7:00000000 r6:83018000 r5:00001000 r4:7f92b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee10d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3478c r4:85d34400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d3478c r4:84ee6d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85396c00 r8:84ee6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6d00 r8:8027f5e8 r7:ee0ede60 r6:84ee6d80 r5:85396c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee105fb0 to 0xee105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce4640 INFO: task kworker/0:692:7725 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c2de9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:693:7727 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:693 state:D stack:0 pid:7727 tgid:7727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee111d84 r8:00000002 r7:60000113 r6:ee111d8c r5:85d70000 r4:85d70000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d70000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee111e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:ee119000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:7730 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:7730 tgid:7730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee11dd84 r8:00000002 r7:60000113 r6:ee11dd8c r5:85d70c00 r4:85d70c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d70c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee11de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce4cc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f92f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee125000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d34f8c r4:85d34c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d34f8c r4:84ee6f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d70c00 r8:84ee6f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6f00 r8:8027f5e8 r7:ee111e60 r6:84ee6f80 r5:85d70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ee149000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d35b8c r4:85055000 Exception stack(0xee129fb0 to 0xee129ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r4:00000000 r5:00001000 r4:ee131000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3538c r4:85d35000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d3538c r4:85055100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d72400 r8:8505512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055100 r8:8027f5e8 r7:ee129e60 r6:85055180 r5:85d72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee135fb0 to 0xee135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce4c40 INFO: task kworker/0:696:7733 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c3b23000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:697:7735 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:697 state:D stack:0 pid:7735 tgid:7735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee14dd84 r8:00000002 r7:60000113 r6:ee14dd8c r5:85d73c00 r4:85d73c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d73c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee14de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce4fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f933000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee13d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3578c r4:85d35400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d3578c r4:85055200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d73c00 r8:8505522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055200 r8:8027f5e8 r7:ee129e60 r6:85055280 r5:85d73c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c3b23000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:7737 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:7737 tgid:7737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee159d84 r8:00000002 r7:60000013 r6:ee159d8c r5:85d74800 r4:85d74800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ee161000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c3f7a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:699 state:D stack:0 pid:7738 tgid:7738 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a240 r5:00001000 r4:ee155000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d35f8c r4:85055400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee141e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee171000 r7:dddced80 r6:83018000 r5:85d3678c r4:85055500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:701 state:D stack:0 pid:7742 tgid:7742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee175d84 r8:00000002 r7:60000113 r6:ee175d8c r5:85d73000 r4:85d73000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d73000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee175e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505aa00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d73000 r7:00000000 r6:83018000 r5:00001000 r4:7f943000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee19d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d36b8c r4:85d36800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d36b8c r4:85055600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d73000 r8:8505562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055600 r8:8027f5e8 r7:ee141e60 r6:85055680 r5:85d73000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee175fb0 to 0xee175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505a400 INFO: task kworker/0:701:7742 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c4410000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ab40 r5:00001000 r4:ee1a9000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85055700 r8:8027f5e8 r7:ee175e60 r6:85055780 r5:845a0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1b1000 r5:85d3738c r4:85d37000 r10:61c88647 r9:845a1800 r8:8505582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505a9c0 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c4d72000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:7752 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:7752 tgid:7752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee189d84 r8:00000002 r7:60000013 r6:ee189d8c r5:845a2400 r4:845a2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845a2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee189e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ae40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f949000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1b9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3778c r4:85d37400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d3778c r4:85055900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845a2400 r8:8505592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055900 r8:8027f5e8 r7:ee169e60 r6:85055980 r5:845a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee189fb0 to 0xee189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505ab00 INFO: task kworker/0:704:7752 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 dd20: c52e5000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ee1c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:845a3000 r8:85055a2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505acc0 INFO: task kworker/0:705:7754 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c52e5000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:7755 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:7755 tgid:7755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:845a3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1cde08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd85000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee1cdfb0 to 0xee1cdff8) r4:8505ae00 Workqueue: events bpf_prog_free_deferred dd20: c58aa000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r4:00000000 r5:00001000 r4:ed6c1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d40b8c r4:85055c00 r10:00000000 r9:85055c00 r8:8027f5e8 r7:ee1cde60 r6:8592c180 r5:85c24800 r4:84d491c0 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1e9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8ab000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed413000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4038c r4:85d40000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4038c r4:85055c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c26c00 r8:85055cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055c80 r8:8027f5e8 r7:ee1dde60 r6:8592c200 r5:85c26c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1e9fb0 to 0xee1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d49100 INFO: task kworker/0:708:7761 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c58aa000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:709:7762 blocked for more than 479 seconds. r4:85c23c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1ede08 r5:00001000 r4:ed633000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee1edfb0 to 0xee1edff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r5:00001000 r4:e884f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ee1f1d84 r8:00000002 r7:60000113 r6:ee1f1d8c r5:85c26000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed761000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d40f8c r4:85d40c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d40f8c r4:85055d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c26000 r8:85055dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055d80 r8:8027f5e8 r7:ee1dde60 r6:8592c300 r5:85c26000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1f1fb0 to 0xee1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d493c0 INFO: task kworker/0:710:7764 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c5e5d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:7766 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:ee1f5d84 r8:00000002 r7:60000113 r6:ee1f5d8c r5:85c22400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed7f5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:712:7768 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:712 state:D stack:0 pid:7768 tgid:7768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee1f9d84 r8:00000002 r7:60000013 r6:ee1f9d8c r5:85c23000 r4:85c23000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1f9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:ed8d7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d41b8c r4:85d41800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d41b8c r4:85055e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c23000 r8:85055eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055e80 r8:8027f5e8 r7:ee1f5e60 r6:8592c400 r5:85c23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1f9fb0 to 0xee1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d496c0 INFO: task kworker/0:712:7768 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c619a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 r4:85c21800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1fde08 r5:00001000 r4:ed86f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454db00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:7773 tgid:7773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee209d84 r8:00000002 r7:60000013 r6:ee209d8c r5:85c18c00 r4:85c18c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c18c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee209e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49d40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8bd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed981000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4238c r4:85d42000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4238c r4:85055f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c18c00 r8:85055fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055f80 r8:8027f5e8 r7:ee1f9e60 r6:8592c500 r5:85c18c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee209fb0 to 0xee209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d49940 INFO: task kworker/0:714:7773 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c6671000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ee20dd84 r8:00000002 r7:60000013 r6:ee20dd8c r5:85c16c00 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed90f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xee20dfb0 to 0xee20dff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe884dfb0 to 0xe884dff8) task:kworker/0:716 state:D stack:0 pid:7776 tgid:7776 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eda4d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xee1c9fb0 to 0xee1c9ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c6e3b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:717:7777 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:717 state:D stack:0 pid:7777 tgid:7777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee1d9d84 r8:00000002 r7:60000013 r6:ee1d9d8c r5:845a6000 r4:845a6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845a6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1d9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49e40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f8bf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda0f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4278c r4:85d42400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4278c r4:85951180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845a6000 r8:859511ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85951180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85951180 r8:8027f5e8 r7:ee1c9e60 r6:85951200 r5:845a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1d9fb0 to 0xee1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:717:7777 is blocked on a mutex likely owned by task kworker/1:174:3878. Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ee211d84 r8:00000002 r7:60000013 r6:ee211d8c r5:845a6c00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ede73000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d4338c r4:85951280 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:7782 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:7782 tgid:7782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee219d84 r8:00000002 r7:60000013 r6:ee219d8c r5:845a5400 r4:845a5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845a5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee219e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd3380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f8c3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda81000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d42f8c r4:85d42c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d42f8c r4:85951380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845a5400 r8:859513ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85951380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85951380 r8:8027f5e8 r7:ee211e60 r6:85951400 r5:845a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee219fb0 to 0xee219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d49f40 INFO: task kworker/0:719:7782 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c740b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:7783 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:7783 tgid:7783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee215d84 r8:00000002 r7:60000113 r6:ee215d8c r5:845a0000 r4:845a0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845a0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee215e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f8c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edeaf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d43b8c r4:85d43800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:845a0000 r8:859514ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xee215fb0 to 0xee215ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:720:7783 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c740b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:7786 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:7786 tgid:7786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee21dd84 r8:00000002 r7:60000013 r6:ee21dd8c r5:85d76c00 r4:85d76c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d76c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee21de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e100 r4:00000000 r9:83018005 r8:85d76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8c7000 r5:00001000 r4:edea3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d4378c r4:85951580 Exception stack(0xee21dfb0 to 0xee21dff8) INFO: task kworker/0:721:7786 is blocked on a mutex likely owned by task kworker/1:174:3878. Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85d43f8c r4:85951680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c28c00 r8:859516ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85951680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85951680 r8:8027f5e8 r7:ee215e60 r6:8592c600 r5:85c28c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee229fb0 to 0xee229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586e180 INFO: task kworker/0:722:7788 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c79c2000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:7791 blocked for more than 479 seconds. Workqueue: events bpf_prog_free_deferred r10:8291880c r9:ee22dd84 r8:00000002 r7:60000113 r6:ee22dd8c r5:85c2a400 r5:85c2a400 r4:82918808 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edf75000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4838c r4:85d48000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c2a400 r8:8595172c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85c29800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c29800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee239e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c29800 r7:00000000 r6:83018000 r5:00001000 r4:7f8d5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf83000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4878c r4:85d48400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4878c r4:85951780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c29800 r8:859517ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85951780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85951780 r8:8027f5e8 r7:ee22de60 r6:8592c700 r5:85c29800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee239fb0 to 0xee239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586e400 INFO: task kworker/0:724:7794 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c79c2000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:725:7796 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.